CFP last date
20 May 2024
Reseach Article

Study of Wormhole Attack in Mobile Ad-Hoc Network

by Ashish Kr. Shrivastava, Neha Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 12
Year of Publication: 2013
Authors: Ashish Kr. Shrivastava, Neha Jain
10.5120/12795-0138

Ashish Kr. Shrivastava, Neha Jain . Study of Wormhole Attack in Mobile Ad-Hoc Network. International Journal of Computer Applications. 73, 12 ( July 2013), 32-37. DOI=10.5120/12795-0138

@article{ 10.5120/12795-0138,
author = { Ashish Kr. Shrivastava, Neha Jain },
title = { Study of Wormhole Attack in Mobile Ad-Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 12 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 32-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number12/12795-0138/ },
doi = { 10.5120/12795-0138 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:39:55.341247+05:30
%A Ashish Kr. Shrivastava
%A Neha Jain
%T Study of Wormhole Attack in Mobile Ad-Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 12
%P 32-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad-hoc network could be a quickly set network by wireless mobile computers (or nodes) moving absolute within the place that don't have any mounted network infrastructure. The requirement for cooperation among nodes to relay every other's packets within the ad-hoc network exposes them to a wide range of security attacks. Ad-hoc wireless network is not secure to the attacks of malicious nodes ,out of all the attack cause by the malicious nodes, the foremost devastating attack is thought because the wormhole attack, within two or more malicious colluding nodes produce a higher level virtual tunnel(or secrete tunnel) within the network, that transport packets at one location within the network wherever the human records transmitted packets at one location, and transmit them into the network . Even if all communication provides authenticity and confidentiality, the wormhole attack is feasible. This paper presents a study on wormhole attack and its counter measures in ad-hoc wireless network, along with the future research scope.

References
  1. Mariane A. Azer, Sherif M. El-Kassas, ?An Innovative Approach for the Wormhole Attack Detection and Prevention in Wireless Ad-hoc Network?2010.
  2. Matthew Tan Creti,Matthew Beaman,Saurabh Bagchi,Zhiyuan Li,Yung-Hsiang Lu, ?Multigrade Security Monitoring for Ad-hoc Wireless Networks? ,2009IEEE.
  3. Bhargava, B. de Oliveira, R. Yu Zhang Idika, ?Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks? 29th IEEE International Conference on Distributed Computing Systems, 2009
  4. Pradip M. Jawandhiya et. al. / International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4063-4071.
  5. Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
  6. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch
  7. Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, and David B. Johnson, Member, IEEE Wormhole Attacks in Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
  8. Saurabh Gupta, Subrat Kar, S Dharmaraja "WHOP: Wormhole Attack Detection Protocol using Hound Packet" 2011 International Conference on Innovations Technology IEEE
  9. Rajpal Singh Khainwar1, Mr. Anurag Jain2, Mr. Jagdish Prasad Tyagi3" Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm" ISSN 2250-2459 Volume 1, Issue 2, December 2011
  10. H. S. Chiu and K. S. Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks," in Proc. International Symposium on Wireless Pervasive computing, Phuket, Thailand, pp. 1-6, 2006.
  11. L. Hu and D. Evans "Using directional antennas to prevent wormhole attacks" In Proceedings of the Network and Distributed System Security Symposium.
  12. L. Lazos, and R. Poovendran, "SeRLoc: Secure Range- Independent Localization for Wireless Sensor Networks," in ACM WiSE'04, New York, NY, USA, pp. 73–100, October 2004.
  13. P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", In Proc. 6th IFIP Commun. and Multimedia Security Conf. , Sept. 2002
  14. Pushpendra Niranjan, Prashant Srivastava, Raj kumar Soni, Ram Pratap "Detection of wormhole attack using Hop count and Time delay analysis" International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 ISSN 2250-3153.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Networks Malicious Node attacks Wormhole attack DSR (Dynamic Source Routing)