![]() |
10.5120/15092-3091 |
Neha Sahu, Deepak Singh Tomar and Neelam Pathak. Article: An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack. International Journal of Computer Applications 85(19):5-8, January 2014. Full text available. BibTeX
@article{key:article, author = {Neha Sahu and Deepak Singh Tomar and Neelam Pathak}, title = {Article: An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {85}, number = {19}, pages = {5-8}, month = {January}, note = {Full text available} }
Abstract
Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. one attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is a very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. . This paper uses demonstrate different existing worm hole deduction mechanism and discus problem in existing mechanism
References
- S. Marti et al. "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of Sixth Annual IEEE/ACM Intl. Conference on Mobile Computing and Networking , April 2009,PP. 225-256.
- Jie Zhou1, Jiannong Cao, Jun Zhang1, Chisheng Zhang and Yao Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Test bed" in 26th IEEE International Conference on Advanced Information Networking and Applications,2012
- Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE ,2011
- Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE,2012
- Jin Guo, Zhi-yong Lei "A Kind of Wormhole Attack Defense Strategy ofWSN Based on Neighbor Nodes Verification" in IEEE 2011 RFC 792, Internet Control Message Protocol
- D. Johnson , D. A. Maltz, and J. Broch. The Dynamic Source Routing Protocol for Mobile Ad hoc Networs (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999
- M. Tamer Rafaei, Vivek Srivastav, Luiz DaSilva, "A Reputation-based Mechanism for Isolating Selfish Nodes in Adhoc Networks,"Proceedings of the Second Annual Internatinal Conference on Mobileand Ubiquitous Systems:Networking and Services(MobiQuitous'05
- Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
- Hu. Yih-Chun and A. Perrig, "A Survey of secure wireless ad hoc routing," Security & Privacy, IEEE, vol. 2, pp. 28–39, 2004.
- Fei Shi, Jaejong Baek, Jooseok Song, Weijie Liu. "A novel scheme to prevent MAC layer misbehavior in IEEE 802. 11 ad hoc networks," Journal of Telecommunication Systems (JTS) - Springer, (DOI) 10. 1007/s11235-011-9552-y, 2011.
- Khalil, S. Bagchi, and N. B. Shroff, LiteWorp: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, in Proceedings of the 2005 IEEE International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, June 28-July 1, 2005.
- Y. C. Hu, A. Perrig, and D. B. Johnson, Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380,2006.
- Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks" citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 110. 609
- W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wireless Communication Mobile Computing, vol. 6, no. 4, pp. 483–503, 2006.