International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 73 - Number 12 |
Year of Publication: 2013 |
Authors: Ashish Kr. Shrivastava, Neha Jain |
10.5120/12795-0138 |
Ashish Kr. Shrivastava, Neha Jain . Study of Wormhole Attack in Mobile Ad-Hoc Network. International Journal of Computer Applications. 73, 12 ( July 2013), 32-37. DOI=10.5120/12795-0138
A wireless ad-hoc network could be a quickly set network by wireless mobile computers (or nodes) moving absolute within the place that don't have any mounted network infrastructure. The requirement for cooperation among nodes to relay every other's packets within the ad-hoc network exposes them to a wide range of security attacks. Ad-hoc wireless network is not secure to the attacks of malicious nodes ,out of all the attack cause by the malicious nodes, the foremost devastating attack is thought because the wormhole attack, within two or more malicious colluding nodes produce a higher level virtual tunnel(or secrete tunnel) within the network, that transport packets at one location within the network wherever the human records transmitted packets at one location, and transmit them into the network . Even if all communication provides authenticity and confidentiality, the wormhole attack is feasible. This paper presents a study on wormhole attack and its counter measures in ad-hoc wireless network, along with the future research scope.