International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 85 - Number 19 |
Year of Publication: 2014 |
Authors: Neha Sahu, Deepak Singh Tomar, Neelam Pathak |
10.5120/15092-3091 |
Neha Sahu, Deepak Singh Tomar, Neelam Pathak . An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack. International Journal of Computer Applications. 85, 19 ( January 2014), 5-8. DOI=10.5120/15092-3091
Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. one attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is a very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. . This paper uses demonstrate different existing worm hole deduction mechanism and discus problem in existing mechanism