A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION
Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.7, No. 4)Publication Date: 2016-12-01
Authors : Sudhir T Bagade; Vijay T Raisinghan;
Page : 1417-1426
Keywords : Ad-hoc Network; Secure Routing; Wormhole Attack; Hidden Wormhole; Exposed Wormhole;
Abstract
In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.
Other Latest Articles
- PREVENTING CLICK EVENT HIJACKING BY USER INTENTION INFERENCE
- ECONOMIC DENIAL OF SUSTAINABILITY (EDOS) ATTACK ON CLOUD – A SURVEY
- PERFORMANCE ANALYSIS OF CHAOS BASED INTERLEAVER IN IDMA SYSTEM
- PENANGANAN SENGKETA TATA USAHA NEGARA (TUN) YANG TIDAK TERMASUK KEPUTUSAN TATA USAHA NEGARA (KTUN) OLEH PERADILAN UMUM (PU) SETELAH PENERAPAN UNDANG-UNDANG NOMOR 9 TAHUN 2004 TENTANG PTUN
- TAWS: TABLE ASSISTED WALK STRATEGY IN CLONE ATTACK DETECTION
Last modified: 2017-04-03 15:32:16