Academic Journals Database
Disseminating quality controlled scientific knowledge

Defending Wormhole Attack in Wireless Ad-hoc Network

ADD TO MY LIST
 
Author(s): Nisha S.Raote

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 2;
Issue: 3;
Start page: 143;
Date: 2011;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Ad Hoc Networks | comprised nodes | attacks | Wormhole attack | Wormhole attack modes

ABSTRACT
The ad-hoc networks are the temporarily established wireless networks which does not require fixedinfrastructure it is also called as infrastructure less network. Because of some flaws of adhoc networksuch as shared wireless medium and lack of any central coordination makes them more prone to attacksin comparison with the wired network. Among all the attacks wormhole attack is the most severe attack.In this attack an attacker capture the packets at one location in the network and send it two anotherattacker at a distant location through tunnels which is established through different ways like packetencapsulation, using high power transmission or by using direct antennas. This tunnel between twocolluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if theattacker has not comprised any hosts, and all communication provides authenticity and confidentiality.By using the various approaches for finding the solution over wormhole attack, the dynamic informationof the packets could still be modified. So in order to give more robust protection in some special scenariolike battlefields, which requires highly secured information, there is need of developing some securedmechanism for wormhole detection and prevention. Taking into consideration this problem the proposedscheme is developed. This paper discusses proposed works on wormhole attack along with its availablecounter measures in ad-hoc wireless network.
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona