Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 85 - Number 19
Year of Publication: 2014
Authors:
Neha Sahu
Deepak Singh Tomar
Neelam Pathak
10.5120/15092-3091

Neha Sahu, Deepak Singh Tomar and Neelam Pathak. Article: An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack. International Journal of Computer Applications 85(19):5-8, January 2014. Full text available. BibTeX

@article{key:article,
	author = {Neha Sahu and Deepak Singh Tomar and Neelam Pathak},
	title = {Article: An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {85},
	number = {19},
	pages = {5-8},
	month = {January},
	note = {Full text available}
}

Abstract

Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. one attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is a very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. . This paper uses demonstrate different existing worm hole deduction mechanism and discus problem in existing mechanism

References

  • S. Marti et al. "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of Sixth Annual IEEE/ACM Intl. Conference on Mobile Computing and Networking , April 2009,PP. 225-256.
  • Jie Zhou1, Jiannong Cao, Jun Zhang1, Chisheng Zhang and Yao Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Test bed" in 26th IEEE International Conference on Advanced Information Networking and Applications,2012
  • Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE ,2011
  • Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE,2012
  • Jin Guo, Zhi-yong Lei "A Kind of Wormhole Attack Defense Strategy ofWSN Based on Neighbor Nodes Verification" in IEEE 2011 RFC 792, Internet Control Message Protocol
  • D. Johnson , D. A. Maltz, and J. Broch. The Dynamic Source Routing Protocol for Mobile Ad hoc Networs (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999
  • M. Tamer Rafaei, Vivek Srivastav, Luiz DaSilva, "A Reputation-based Mechanism for Isolating Selfish Nodes in Adhoc Networks,"Proceedings of the Second Annual Internatinal Conference on Mobileand Ubiquitous Systems:Networking and Services(MobiQuitous'05
  • Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  • Hu. Yih-Chun and A. Perrig, "A Survey of secure wireless ad hoc routing," Security & Privacy, IEEE, vol. 2, pp. 28–39, 2004.
  • Fei Shi, Jaejong Baek, Jooseok Song, Weijie Liu. "A novel scheme to prevent MAC layer misbehavior in IEEE 802. 11 ad hoc networks," Journal of Telecommunication Systems (JTS) - Springer, (DOI) 10. 1007/s11235-011-9552-y, 2011.
  • Khalil, S. Bagchi, and N. B. Shroff, LiteWorp: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, in Proceedings of the 2005 IEEE International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, June 28-July 1, 2005.
  • Y. C. Hu, A. Perrig, and D. B. Johnson, Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380,2006.
  • Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks" citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 110. 609
  • W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wireless Communication Mobile Computing, vol. 6, no. 4, pp. 483–503, 2006.