Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Stealthy Attacks in Wireless Ad Hoc Networks

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 3
Year of Publication: 2012
Authors:
Rohinee Bankar
Prajakta Mehetre
Swati Salve

Rohinee Bankar, Prajakta Mehetre and Swati Salve. Article: Stealthy Attacks in Wireless Ad Hoc Networks. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(3):1-3, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Rohinee Bankar and Prajakta Mehetre and Swati Salve},
	title = {Article: Stealthy Attacks in Wireless Ad Hoc Networks},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {3},
	pages = {1-3},
	month = {May},
	note = {Full text available}
}

Abstract

Stealthy packet dropping comprises two attacks: Identity Delegation and Colluding Collision. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. Wireless ad hoc networks do not have a router as gateway, every node can act as the gateway. The source and target node necessarily need to be out of range. The intermediate node is actually legitimate in nature, but is made to act in such a way that it does not route the packet to the destination

References

  • Y. C. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. ACM Workshop Wireless Security (WiSe '03), pp. 30-40, 2003.
  • Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, pp. 1976-986, 2003.
  • I. Khalil, S. Bagchi, and N. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks (DSN '05), pp. 612-621, 2005.
  • I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008.
  • I. Stojmenovic, Handbook of Sensor Networks: Algorithms and Architecture. Wiley, 2005.
  • F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Network," Proc. Eighth ACM Ann. Conf. Mobile Computing and Networking, pp. 148-159, 2002.
  • Q. Zhang, P. Wang, D. Reeves, and P. Ning, "Defending against Sybil Attacks in Sensor Networks," Proc. Int'l Workshop Security in Distributed Computing Systems (SDCS '05), pp. 185-191, 2005.
  • I. Khalil, S. Bagchi, "Stealthy Attacks in Wireless Ad hoc Networks: Detection and Countermeasure".