CFP last date
20 December 2024
Reseach Article

A Review of Worm Hole over Mobile Ad Hoc Network

by Pratima Singh, Nitesh Gupta, Ashish Srivastava
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 3
Year of Publication: 2013
Authors: Pratima Singh, Nitesh Gupta, Ashish Srivastava
10.5120/12338-8614

Pratima Singh, Nitesh Gupta, Ashish Srivastava . A Review of Worm Hole over Mobile Ad Hoc Network. International Journal of Computer Applications. 71, 3 ( June 2013), 23-26. DOI=10.5120/12338-8614

@article{ 10.5120/12338-8614,
author = { Pratima Singh, Nitesh Gupta, Ashish Srivastava },
title = { A Review of Worm Hole over Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 3 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number3/12338-8614/ },
doi = { 10.5120/12338-8614 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:34:31.681957+05:30
%A Pratima Singh
%A Nitesh Gupta
%A Ashish Srivastava
%T A Review of Worm Hole over Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 3
%P 23-26
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. One attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This paper uses demonstrate different existing worm hole deduction mechanism and discuss problem in existing mechanism.

References
  1. S. Marti et al. "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of Sixth Annual IEEE/ACM Intl. Conference on Mobile Computing and Networking , April 2009,PP. 225-256.
  2. Jie Zhou1, Jiannong Cao, Jun Zhang1, Chisheng Zhang and Yao Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Test bed" in 26th IEEE International Conference on Advanced Information Networking and Applications,2012
  3. Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE ,2011
  4. Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE,2012
  5. Jin Guo, Zhi-yong Lei "A Kind of Wormhole Attack Defense Strategy ofWSN Based on Neighbor Nodes Verification" in IEEE 2011
  6. RFC 792, Internet Control Message Protocol
  7. D. Johnson , D. A. Maltz, and J. Broch. The Dynamic Source Routing Protocol for Mobile Ad hoc Networs (Internet-Draft). Mobile Ad-hoc Network (MANET) Working Group, IETF, October 1999
  8. M. Tamer Rafaei, Vivek Srivastav, Luiz DaSilva, "A Reputation-based Mechanism for Isolating Selfish Nodes in Adhoc Networks,"Proceedings of the Second Annual Internatinal Conference on Mobileand Ubiquitous Systems:Networking and Services(MobiQuitous'05
  9. Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  10. Hu. Yih-Chun and A. Perrig, "A Survey of secure wireless ad hoc routing," Security & Privacy, IEEE, vol. 2, pp. 28–39, 2004.
  11. Fei Shi, Jaejong Baek, Jooseok Song, Weijie Liu. "A novel scheme to prevent MAC layer misbehavior in IEEE 802. 11 ad hoc networks," Journal of Telecommunication Systems (JTS) - Springer, (DOI) 10. 1007/s11235-011-9552-y, 2011.
  12. I. Khalil, S. Bagchi, and N. B. Shroff, LiteWorp: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, in Proceedings of the 2005 IEEE International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, June 28-July 1, 2005.
  13. Y. C. Hu, A. Perrig, and D. B. Johnson, Wormhole Attacks in Wireless Networks, IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380,2006.
  14. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks" citeseerx. ist. psu. edu/viewdoc/download?doi=10. 1. 1. 110. 609
  15. W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wireless Communication Mobile Computing, vol. 6, no. 4, pp. 483–503, 2006.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network Selfish Malicious ICMP