![]() |
10.5120/16657-6637 |
Priyanka Sharma, H P Sinha and Abhay Bindal. Article: Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks. International Journal of Computer Applications 95(13):34-38, June 2014. Full text available. BibTeX
@article{key:article, author = {Priyanka Sharma and H. P. Sinha and Abhay Bindal}, title = {Article: Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {95}, number = {13}, pages = {34-38}, month = {June}, note = {Full text available} }
Abstract
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusion that the two remote nodes of a MANET are directly connected through nodes that appear to be neighbours, but are actually distant from one another. In this, a secret key is used for encryption and decryption of hello packets. Because of this, the only authentic node will remain in the network, non-authentic nodes (wormhole node) will be discarded. As a result, communication can take place only between the trusted nodes. So malicious node cannot enter into system and communication is secured.
References
- Pravin Khandare, Prof. N. P. Kulkarni, "Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack", International Journal of Computer Trends and Technology- volume4, Issue3, 2013.
- Anil Kumar Fatehpuria, Sandeep Raghuwanshi, "An Efficient Wormhole Prevention in MANET Through Digital Signature", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, 2013.
- L. Sudha Rani, R. Raja Sekhar (Ph. D), " Detection And Prevention Of Wormhole Attack In Stateless Multicasting", International Journal of Scientific & Engineering Research Volume 3, Issue 3, March 2012.
- Pushpendra Niranjan, Prashant Srivastava, Raj Kumar Soni, Ram Pratap, " Detection of Wormhole Attack using Hop-count and Time delay Analysis", International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012.
- N. S. Raote, Mr. K. N. Hande, "Approaches towards Mitigating Wormhole Attack in Wireless Ad-hoc Network", International Journal Of Advanced Engineering Sciences And Technologies Vol. No. 2, issue no. 2, ISSN 2230-7818, pp. 172 – 175, 2011.
- Nidhi Nigam, Amit Saraf, Chetan Nagar, "A Review New Thread Based Wormhole Attack Prevention Mechanism in MANET", International Journal of Electrical, Electronics & Computer Engineering, ISSN No. 2277-2626, pp: 84-87, 2011
- Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad-hoc Network Using Digital Signature", IEEE 2011.
- Saurabh Gupta, Subrat Kar, S Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet", International Conference on Innovations in Information Technology, 2011.
- Mariannne. A. Azer, "Wormhole Attacks Mitigation", Sixth International Conference on Availability, Reliability and Security, 2011.
- Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, " MANET Routing Protocols and Wormhole attack against AODV", IJCSNS International Journal of Computer Sciences and Network Security,VOL. (4), April 2010.
- Majid Khabbazian, Hugues Mercier, and Vijay K. Bhargava, "Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad-hoc Networks", IEEE Transaction On Wireless Communications, VOL. 8, Issue 2, 2009.
- Viren Mahajan, Maitreya Natu, Adarshpal Sethi,"Analysis of Wormhole Intrusion Attack in MANETs", IEEE, 2008.
- Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, "A Survey of Routing Attacks In Mobile Ad Hoc Networks", IEEE Wireless Communications, ISSN No. (1536-1284), pp. 85-91, October 2007.
- L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W Chang, "Preventing Wormhole Attack on Wireless Ad-hoc Networks: A Graph Theoretic Approach", IEEE Communications Society IEEE, 2005.