CFP last date
20 January 2025
Reseach Article

Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks

Published on February 2013 by Bintu Kadhiwala, Harsh Shah
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 9
February 2013
Authors: Bintu Kadhiwala, Harsh Shah
37e7c9b5-e979-40e0-aa33-58cd8788c54d

Bintu Kadhiwala, Harsh Shah . Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 9 (February 2013), 1-6.

@article{
author = { Bintu Kadhiwala, Harsh Shah },
title = { Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 9 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 1-6 },
numpages = 6,
url = { /proceedings/icrtitcs2012/number9/10307-1434/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Bintu Kadhiwala
%A Harsh Shah
%T Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 9
%P 1-6
%D 2013
%I International Journal of Computer Applications
Abstract

Security emerges as a central requirementas mobile ad hoc network applications are deployed. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. It is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. Wormhole attacks can form a serious threat in wireless networks.

References
  1. I. Khalil, S. Bagchi, and N. B. Shroff. "Liteworp : A lightweight countermeasure for the wormhole attack in multihop wireless networks". In DSN, pages 612–621, 2005.
  2. IRTF RRG Ad hoc Network Scaling Research Subgroup, http://w3. antd. nist. gov/wctg/manet/adhoclinks. html
  3. C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and Countermeasures," at the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May, 2003.
  4. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976-1986, 2003.
  5. L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole attacks," in Network and Distributed System Security Symposium, 2004.
  6. Yih-Chun Hu, Adrian Perrig and David B. Johnson "Wormhole Attacks in Wireless Networks", IEEE Journal On Selected Areas In Communications, Vol. 24, No. 2, February 2006.
  7. Marianne Azer, Sherif El-Kassas and Magdy El-Soudani, "A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 1, No. 1, May 2009.
  8. Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos, "TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks", University of California, Riverside
  9. W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending Against Wormhole Attacks in Mobile Ad Hoc Networks", Wiley Journal on Wireless Communications and Mobile Computing, vol. 5, pp. 1-21, 2005.
  10. K. Lee, H. Jeon, and D. Kim, "Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks," in New Technologies,Mobility and Security: Springer Netherlands, 2007, pp. 361-37
  11. K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks", The International Journal of Computer and Telecommunications Networking vol. 51, pp. 3750-3772, 2007.
  12. Xia Wang, JohnnyWong, "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks", Department of Computer Science, Iowa State University, Ames, Iowa 50011.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Network Wormhole Attack Malicious Node