We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Review Paper on Wormhole Attack

by Garima Kadian, Dinesh Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 131 - Number 13
Year of Publication: 2015
Authors: Garima Kadian, Dinesh Singh
10.5120/ijca2015907529

Garima Kadian, Dinesh Singh . Review Paper on Wormhole Attack. International Journal of Computer Applications. 131, 13 ( December 2015), 26-31. DOI=10.5120/ijca2015907529

@article{ 10.5120/ijca2015907529,
author = { Garima Kadian, Dinesh Singh },
title = { Review Paper on Wormhole Attack },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 131 },
number = { 13 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume131/number13/23511-2015907529/ },
doi = { 10.5120/ijca2015907529 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:27:16.138065+05:30
%A Garima Kadian
%A Dinesh Singh
%T Review Paper on Wormhole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 131
%N 13
%P 26-31
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.

References
  1. http://en.wikipedia.org/wiki/Wireless_network.Wireless Network - Wikipedia, Retrieved March 4, 2015.
  2. Debnath Bhattacharyya, et al, “A Comparative Study of Wireless Sensor Networks and Their Routing Protocols”, In MDPI-2010, Basel, Switzerland, Nov. 2010.
  3. Priya Maidamwar and Nekita Chavhan,“ A Survey on Security Issues to Detect Wormhole Attack In Wireless Sensor Network”, In Proceeding of the International Journal on Ad-Hoc Networking Systems (IJANS) Vol. 2, No. 4, October 2012.
  4. Dr.G.Padmavathi and Mrs. D. Shanmugapriya, “A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks,” In Proceeding of the International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009.
  5. Shaishav Shah and Aanchal Jain, “Techniques For Detection & Avoidance Of Wormhole Attack In Wireless Ad Hoc Networks”, In Proceeding of the International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 10, December- 2012.
  6. Ali M, et al, “Mitigation of Wormhole Attack in Wireless Sensor Networks”, In Proceeding of the Atlantis Press 2012.
  7. Majid M, et al, “A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks”, In Proceeding of the IETE Technical Review, April.2011.
  8. Maria Sebastian and Arun Raj Kumar P. “ A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer”, In Proceeding of the I. J. Computer Network and Information Security, 2013.
  9. Yih-Chun Hu, Adrian Perrig, and David B. Johnson― “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks”, In Proceedings of the IEEE Conference on Computer Communications (Infocom), 2003, p. 1976-1986.
  10. L.Hu and D. Evans. “Using directional antennas to prevent wormhole attacks,” Proceedings of Network and Distributed System Security Symposium, pp. 131−41, Feb. 2004.
  11. Hon Sun Chiu and King-Shan Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, International Symposium on Wireless Pervasive Computing (ISWPC), 2006.
  12. T Phuong Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee, and Heejo Lee,“ Transmission time-based mechanism to detect wormhole attack” ,In Proceedings of the IEEE Asia-Pacific Service Computing Conference, Dec. 11-14, 2007, p. 172-178.
  13. Mohammad Rafiqul Alam and King Sun Chan, “RTT-TC: A Topological Comparison Based Method to Detect Wormhole Attacks in MANET”, 12th IEEE International Conference on Communication Technology, 2010, p. 991-994.
  14. S. Capkun, L. Buttyán, and J.P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” Proceedings of the 1st ACM workshop on Security of ad-hoc and sensor networks (SASN 03), pp.21−32, Oct. 2003.
  15. S. Brands and D. Chaum, “Distance-bounding protocols,” In Theory and Application of Cryptographic Techniques, pp. 344−59, 1993
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Wormhole Attack.