International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 104 - Number 7 |
Year of Publication: 2014 |
Authors: Shivangi Dwivedi, Priyanka Tripathi |
10.5120/18214-9172 |
Shivangi Dwivedi, Priyanka Tripathi . An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network. International Journal of Computer Applications. 104, 7 ( October 2014), 18-23. DOI=10.5120/18214-9172
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree of mobility. In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. In such networks, the wireless mobile nodes may dynamically enter the network as well as go-ahead the network. Mobile ad hoc network is a group of many more devices or nodes with the capability of communication and networking. MANET encounter by number of security threat because of its open entrusted environment with little security settlement, even if security over MANET is not to be enhance up to satisfactory level because of its characteristics Security is an essential service for wired and wireless network communication. Due to its mobility and self routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layers, Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbors and makes conversation through the wormhole tunnel. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. For wormhole attack to have a best impact on the wired or wireless network, it must fascinate a huge amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem of wormhole attack.