CFP last date
20 January 2025
Reseach Article

Evaluating Impact of Wormhole on Distance Error and Connectivity of Network

by Shalki Naresh, Navjot Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 148 - Number 7
Year of Publication: 2016
Authors: Shalki Naresh, Navjot Singh
10.5120/ijca2016911213

Shalki Naresh, Navjot Singh . Evaluating Impact of Wormhole on Distance Error and Connectivity of Network. International Journal of Computer Applications. 148, 7 ( Aug 2016), 22-28. DOI=10.5120/ijca2016911213

@article{ 10.5120/ijca2016911213,
author = { Shalki Naresh, Navjot Singh },
title = { Evaluating Impact of Wormhole on Distance Error and Connectivity of Network },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 148 },
number = { 7 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 22-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume148/number7/25770-2016911213/ },
doi = { 10.5120/ijca2016911213 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:52:43.254695+05:30
%A Shalki Naresh
%A Navjot Singh
%T Evaluating Impact of Wormhole on Distance Error and Connectivity of Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 148
%N 7
%P 22-28
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless mesh networks are the emerging wireless networks which are self organizing, maintaining, healing and configuring. The main trait of WMN is its dynamic and multi-hop nature. These networks provide the internet services to its users on low costs and with high bandwidth. These are made up of mesh routers and mesh clients. They can be easily deployed and are highly scalable. But the security of WMNs is the area of concern due to their vulnerable features they are open to many attacks of which wormhole attack is the worst. A wormhole attack is the one in which two or more conspired nodes forms a tunnel between them via which they sends the network traffic to one another and replays it. In our paper, we study the wormhole attack and then find its impact on distance error and connectivity of nodes. The distance error is found by knowing the ratio of trusted links and that of connectivity is found by knowing the unaffected, disconnected and partially affected nodes.

References
  1. Lingxuan Hu, David Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
  2. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks”, International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.
  3. Stephen Glass, Vallipuram Muthukkumurasamy, Marius Portmann, “Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks”, 2009 International Conference on Advanced Information Networking and Applications.
  4. Divya Bansal, Sanjeev Sofat, “Threshold based Authorization model for Authentication of a node in Wireless Mesh Networks”, Int. J. of Advanced Networking and Applications Volume: 01, Issue: 06, Pages: 387-392 (2010).
  5. Nadher M. A. Al_Safwani, Suhaidi Hassan, Mohammed M. Kadhum, “Mobile Ad-hoc networks under wormhole attack: A simulation study”, Proceedings of the 3rd International Conference on Computing and Informatics, ICOCI 2011,8-9 June, 2011 Bandung, Indonesia.
  6. Aggeliki Sgora, Dimitrios D. Vergados and P. Chatzimisios, “A Survey on Security and Privacy Issues in Wireless Mesh Networks”.
  7. Priti Gupta, Suveg Moudgil, “A Novel Scheme to Detect Wormhole Attacks in Wireless Mesh Network”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, 4798-4801.
  8. Binish Raza, Faiza Qaiser, Muhammad Ahsan Raza, “Study of Routing Protocols in Wireless Mesh Networks”, IJASR International Journal of Academic Scientific Research ISSN: 2272-6446 Volume 2, Issue 2 (May-June 2014), PP 19-26.
  9. Kaifeng Wen, “Research on Wireless-Based Intrusion Detection in Mesh Network Security System”, International Conference on Information Technology and Management Innovation (ICITMI 2015) © 2015. The authors - Published by Atlantis Press.
  10. Virendra Dani, Vijay Birchha, “An Improved Wormhole Attack Detection and Prevention Method for Wireless Mesh Networks”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 4, Issue 12, December 2015.
  11. Jonny Karlsson, Laurence S. Dooley and Göran Pulkkis, “Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm”, Sensors (Basel). 2013 May; 13(5): 6651–6668. Published online 2013 May 17.
  12. Monika, “Denial of Service Attacks in Wireless Mesh Networks”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3), 2012, 4516-4522.
  13. Dezun Dong, Mo Li, Yunhao Liu and Xiangke Liao, “WormCircle: Connectivity-based Wormhole Detection in Wireless Ad Hoc and Sensor Networks”, 2009 15th International Conference on Parallel and Distributed Systems.
  14. Tahir Naeem, Kok-Keong Loo, “Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks”, International Journal of Digital Content Technology and its Applications Volume 3, Number 1, March 2009.
Index Terms

Computer Science
Information Sciences

Keywords

WMN (Wireless mesh networks) wormhole attack impact on distance error impact on connectivity.