3 Questions 11 Answers 0 Followers
Questions related from Maryam Iman
To define malicious nodes as well as create wormhole links what commands should be used in wireless sensor networks (for NS2 in TCL Code) ? I've used the following commands in the program, but I'm...
30 June 2016 4,715 6 View
How can notice which type of routing protocol used to implement a wireless sensor network with NS2 in an article when there is no mention of it in the paper?
29 June 2016 4,018 12 View
How can define wireless wormhole link (tunnel) between two wormhole nodes for implementation of wormhole attack in wsn by using ns2 (tcl code) ?
01 January 1970 1,477 4 View