Research Article

Study of Wormhole Attack in Mobile Ad-Hoc Network

by  Ashish Kr. Shrivastava, Neha Jain
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Issue 12
Published: July 2013
Authors: Ashish Kr. Shrivastava, Neha Jain
10.5120/12795-0138
PDF

Ashish Kr. Shrivastava, Neha Jain . Study of Wormhole Attack in Mobile Ad-Hoc Network. International Journal of Computer Applications. 73, 12 (July 2013), 32-37. DOI=10.5120/12795-0138

                        @article{ 10.5120/12795-0138,
                        author  = { Ashish Kr. Shrivastava,Neha Jain },
                        title   = { Study of Wormhole Attack in Mobile Ad-Hoc Network },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 73 },
                        number  = { 12 },
                        pages   = { 32-37 },
                        doi     = { 10.5120/12795-0138 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Ashish Kr. Shrivastava
                        %A Neha Jain
                        %T Study of Wormhole Attack in Mobile Ad-Hoc Network%T 
                        %J International Journal of Computer Applications
                        %V 73
                        %N 12
                        %P 32-37
                        %R 10.5120/12795-0138
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

A wireless ad-hoc network could be a quickly set network by wireless mobile computers (or nodes) moving absolute within the place that don't have any mounted network infrastructure. The requirement for cooperation among nodes to relay every other's packets within the ad-hoc network exposes them to a wide range of security attacks. Ad-hoc wireless network is not secure to the attacks of malicious nodes ,out of all the attack cause by the malicious nodes, the foremost devastating attack is thought because the wormhole attack, within two or more malicious colluding nodes produce a higher level virtual tunnel(or secrete tunnel) within the network, that transport packets at one location within the network wherever the human records transmitted packets at one location, and transmit them into the network . Even if all communication provides authenticity and confidentiality, the wormhole attack is feasible. This paper presents a study on wormhole attack and its counter measures in ad-hoc wireless network, along with the future research scope.

References
  • Mariane A. Azer, Sherif M. El-Kassas, ?An Innovative Approach for the Wormhole Attack Detection and Prevention in Wireless Ad-hoc Network?2010.
  • Matthew Tan Creti,Matthew Beaman,Saurabh Bagchi,Zhiyuan Li,Yung-Hsiang Lu, ?Multigrade Security Monitoring for Ad-hoc Wireless Networks? ,2009IEEE.
  • Bhargava, B. de Oliveira, R. Yu Zhang Idika, ?Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks? 29th IEEE International Conference on Distributed Computing Systems, 2009
  • Pradip M. Jawandhiya et. al. / International Journal of Engineering Science and Technology Vol. 2(9), 2010, 4063-4071.
  • Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma JOURNAL OF COMPUTING, VOLUME 3, ISSUE 1, JANUARY 2011, ISSN 2151-9617
  • DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks David B. Johnson David A. Maltz Josh Broch
  • Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, and David B. Johnson, Member, IEEE Wormhole Attacks in Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 2, FEBRUARY 2006
  • Saurabh Gupta, Subrat Kar, S Dharmaraja "WHOP: Wormhole Attack Detection Protocol using Hound Packet" 2011 International Conference on Innovations Technology IEEE
  • Rajpal Singh Khainwar1, Mr. Anurag Jain2, Mr. Jagdish Prasad Tyagi3" Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm" ISSN 2250-2459 Volume 1, Issue 2, December 2011
  • H. S. Chiu and K. S. Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks," in Proc. International Symposium on Wireless Pervasive computing, Phuket, Thailand, pp. 1-6, 2006.
  • L. Hu and D. Evans "Using directional antennas to prevent wormhole attacks" In Proceedings of the Network and Distributed System Security Symposium.
  • L. Lazos, and R. Poovendran, "SeRLoc: Secure Range- Independent Localization for Wireless Sensor Networks," in ACM WiSE'04, New York, NY, USA, pp. 73–100, October 2004.
  • P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks", In Proc. 6th IFIP Commun. and Multimedia Security Conf. , Sept. 2002
  • Pushpendra Niranjan, Prashant Srivastava, Raj kumar Soni, Ram Pratap "Detection of wormhole attack using Hop count and Time delay analysis" International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 ISSN 2250-3153.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Ad Hoc Networks Malicious Node attacks Wormhole attack DSR (Dynamic Source Routing)

Powered by PhDFocusTM