CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Stealthy Attacks in Wireless Ad Hoc Networks

Published on May 2012 by Rohinee Bankar, Prajakta Mehetre, Swati Salve
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 3
May 2012
Authors: Rohinee Bankar, Prajakta Mehetre, Swati Salve
c0ffdf5c-6f84-4e87-91fa-358cab19f209

Rohinee Bankar, Prajakta Mehetre, Swati Salve . Stealthy Attacks in Wireless Ad Hoc Networks. National Conference on Recent Trends in Computing. NCRTC, 3 (May 2012), 1-3.

@article{
author = { Rohinee Bankar, Prajakta Mehetre, Swati Salve },
title = { Stealthy Attacks in Wireless Ad Hoc Networks },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 3 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 1-3 },
numpages = 3,
url = { /proceedings/ncrtc/number3/6527-1017/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Rohinee Bankar
%A Prajakta Mehetre
%A Swati Salve
%T Stealthy Attacks in Wireless Ad Hoc Networks
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 3
%P 1-3
%D 2012
%I International Journal of Computer Applications
Abstract

Stealthy packet dropping comprises two attacks: Identity Delegation and Colluding Collision. Stealthy packet dropping disrupts the packet from reaching the destination through malicious behavior at an intermediate node. Wireless ad hoc networks do not have a router as gateway, every node can act as the gateway. The source and target node necessarily need to be out of range. The intermediate node is actually legitimate in nature, but is made to act in such a way that it does not route the packet to the destination

References
  1. Y. C. Hu, A. Perrig, and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proc. ACM Workshop Wireless Security (WiSe '03), pp. 30-40, 2003.
  2. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, pp. 1976-986, 2003.
  3. I. Khalil, S. Bagchi, and N. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," Proc. Int'l Conf. Dependable Systems and Networks (DSN '05), pp. 612-621, 2005.
  4. I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks," Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008.
  5. I. Stojmenovic, Handbook of Sensor Networks: Algorithms and Architecture. Wiley, 2005.
  6. F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, "A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Network," Proc. Eighth ACM Ann. Conf. Mobile Computing and Networking, pp. 148-159, 2002.
  7. Q. Zhang, P. Wang, D. Reeves, and P. Ning, "Defending against Sybil Attacks in Sensor Networks," Proc. Int'l Workshop Security in Distributed Computing Systems (SDCS '05), pp. 185-191, 2005.
  8. I. Khalil, S. Bagchi, "Stealthy Attacks in Wireless Ad hoc Networks: Detection and Countermeasure".
Index Terms

Computer Science
Information Sciences

Keywords

Packet Dropping Wireless Ad Hoc Networks