A STUDY ON VARIOUS WORMHOLE ATTACK DETECTION TECHNIQUES IN MANET
Sri Vasavi College, Erode Self-Finance Wing, 3rd February 2017. National Conference on Computer and Communication, NCCC’17. International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)
Download this PDF format
Abstract
A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET doesn’t having any access point. Due to high availability of wireless devices infrastructure-less networks are using every day’s life. MANET is suffering from both kinds of attacks, active and passive attacks at all the layers of network model. Wormhole attack is one the most severe attack on routing protocols in which two or more malicious nodes receive packets at one point of network and transmit them another location by wired or wireless tunnel. This attack can form a serious threat in wireless networks, especially against many wireless ad-hoc networks and location-based wireless security systems. There is several wormhole detection methods in the wireless ad-hoc networks which some of them are reviewed in this paper.
References
[1]. Anal Patel, Nimisha Patel, Rajan Patel “Defending Against Wormhole Attack in MANET”, Fifth International Conference on Communication Systems and Network © 2015 IEEE, 2015
[2]. VikaskumarUpadhyay,RajeshShukla “An Assessment of Worm Hole attack over Mobile Ad-Hoc Network as serious threats”, Int. J. Advanced Networking and Applications Vol No 05 January,2013
[3]. D. Helen, D. Arivazhagan “Applications, Advantages and Challenges of Ad Hoc Networks”, Journal of Academia and Industrial Research (JAIR) Vol No 2, 8 January 2014
[4]. YashpalsinhGohil, SumeghaSakhreliya, SumitraMenaria “A Review On: Detection and Prevention of Wormhole Attacks in MANET”, International Journal of Scientific and Research Publications, Vol No 3, February 2013
[5]. PriyankaGoyal, VintiParmar, Rahul Rishi “MANET: Vulnerabilities, Challenges, Attacks, Application”, IJCEM International Journal of Computational Engineering & Management, Vol. No.11, January 2011
[6]. Gupta N., Khurana S., “SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad hocNetworks Against Wormhole Attacks”, Proceedings of the 4th International Conference on Wireless and Mobile Communications (ICWMC’08); Athens, Greece. 27 July–1 August 2008; Pp. 13–18.”
[7]. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks”, IEEE 2003.
[8]. Chiu H.S., Lui K.-S. “DelPHI: Wormhole Detection Mechanism for Ad hocWireless Networks.”, Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. January 2006.Pp 16-18
[9]. Phuong Van Tran1, Le Xuan Hung1, Young-Koo Lee1, Sung, Young Lee1, and Heejo Lee2, “TTM: An Efficient Mechansim to Detect Wormhole Attacks in Wireless Ad-Hoc Networks.”
[10]. Shang-Ming Jen , Chi-Sung Laih and Wen-Chung Kuo, “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET”, Sensors 2009.
Keywords
Adhoc Networks, Manet Attacks, Wormhole Attack,Detection Methods.