Review Research Study on Wormhole Attack in MANET
Keywords:
Ad Hoc Networks, Malicious Node, Wormhole attackAbstract
A MANET (Mobile Ad-hoc network) is a self-configuring infrastructure-less network of mobile devices connected by wireless. Ad-hoc wireless network is not secure to the attacks of malicious nodes. Out of all the attacks caused by malicious nodes, the most devastating attack is thought to be the wormhole attack, wherein two or more malicious colluding nodes produce a high-level virtual tunnel (or secret tunnel) within the network that transports packets from one location in the network to another. The malicious nodes record transmitted packets at one location and retransmit them into the network at another location. Even if all communication provides authenticity and confidentiality, the wormhole attack is still feasible. This paper presents a study on wormhole attack and its countermeasures in ad-hoc wireless networks, along with the future research scope.
References
Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, and David B. Johnson, Member, IEEE, "Wormhole Attacks in Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, February 2006.
Saurabh Gupta, Subrat Kar, S. Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet," 2011 International Conference on Innovations in Technology, IEEE.
Rajpal Singh Khainwar, Mr. Anurag Jain, Mr. Jagdish Prasad Tyagi, "Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm," ISSN 2250-2459, Volume 1, Issue 2, December 2011.
H. S. Chiu and K. S. Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks," Proc. International Symposium on Wireless Pervasive Computing, Phuket, Thailand, pp. 1–6, 2006.
L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," Proceedings of the Network and Distributed System Security Symposium.
L. Lazos and R. Poovendran, "SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks," ACM WiSE’04, New York, NY, USA, pp. 73–100, October 2004.
P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," Proc. 6th IFIP Communications and Multimedia Security Conference, Sept. 2002.
Pushpendra Niranjan, Prashant Srivastava, Raj Kumar Soni, Ram Pratap, "Detection of wormhole attack using Hop count and Time delay analysis," International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012, ISSN 2250-3153.
Downloads
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.