International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 71 - Number 3 |
Year of Publication: 2013 |
Authors: Pratima Singh, Nitesh Gupta, Ashish Srivastava |
10.5120/12338-8614 |
Pratima Singh, Nitesh Gupta, Ashish Srivastava . A Review of Worm Hole over Mobile Ad Hoc Network. International Journal of Computer Applications. 71, 3 ( June 2013), 23-26. DOI=10.5120/12338-8614
Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. One attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This paper uses demonstrate different existing worm hole deduction mechanism and discuss problem in existing mechanism.