A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2012 by IJETT Journal|
|Year of Publication : 2012|
|Authors : Shilpa Jaiswal , Sumeet Agrawal|
Shilpa Jaiswal , Sumeet Agrawal. "A Novel Paradigm: Detection & Prevention of Wormhole Attack in Mobile Ad Hoc Networks". International Journal of Engineering Trends and Technology (IJETT). V3(5):571-573 Sep-Oct 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile ad hoc networ ks among these, security being one of the major concerns. The wormhole attack is among the most threatening and dangerous attacks on these types of networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another distant malicious node, which replays them locally
 Y. - C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of the Second Annual Conferenc e of the IEEE Computer and Communication and Societies
 S. Capkun, L. Buttyan, and J. Hubaux. ‘SECTOR: Secure tracking of node encounters in multi - hop wireless networks’. In the Proceedings of ACM Workshop on Security (Ad Hoc and Sensor Networks
 L. Hu and D. Evans ‘Using directional antennas to prevent wormhole attacks’ In Proceedings of the Network and Distributed Security Symposium (NIX`S).
 W. Wang and B. Bhargava, Visualization of wormholes in sensor networks. In Proceeding of t he ACM Workshop on Wireless Security (WISE).
 Xia Wang, Johnny Wong, An End - to - end Detection of Wormhole Attack in Wireless Ad - hoc Networks, 31st Annual International Computer Software and Applications Conference
 J. Eriksson, S. Krishnamurthy, and M. Faloutsos. TR UELINK: A practical countermeasure to the wormhole attack. In The 14th IEEE International Conference on Network Protocols (ICNP)
 P. Papadimitratos and Z. Haas. Secure routing for mobile ad hoc networks. In SCS Communication Networks and Distributed Sys tems Modeling and Simulation Conference
 Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In IEEE Workshop on Mobile Computing Systems and Applications.
 Y. Hu, A. Perrig, and D. Jo hnson. ARIADNE: A secure on demand routing protocol for ad hoc networks. In ACM MobiCom 2008  Y. - C. Hu and A. Perrig. A survey of secure wireless ad hoc routing. In IEEE Security and Privacy, Special issue on Making Wireless Work, May 2004
 E. W. d ijkstra. A case study on two problems in connection with graph, Numerical Mathematics
 A. A. Pirzada and C. McDonald. Detecting and evading wormholes in mobile ad - hoc wireless networks. International Journal of Network Security,
 J. Broch, D. Joh nson, and D. Maltz. The dynamic source routing protocol for mobile ad hoc networks, Dec. 1998
 L. Qian, N. Song, and X. Li., Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi - path routes. Wireless Communications and Networking Conference, Mar. 2005.
 Y. - C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of the llvenly - Second Annual .loin1 Conference of the IEEE Computer a nd Communication Societies, April 2007
 S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure tracking of node encounters in multi - hop wireless networks. In Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks.
 I. Khalil, S. B agchi, and N. B. Shroff. LITEWORP: A lightweight countermeasure for the wormhole attack in multi hop wireless networks
wormhole, impersonation, legitimacy, security, concurrency