A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTIONJournal: ICTACT Journal on Communication Technology (IJCT) (Vol.7, No. 4)
Publication Date: 2016-12-01
Authors : Sudhir T Bagade; Vijay T Raisinghan;
Page : 1417-1426
Keywords : Ad-hoc Network; Secure Routing; Wormhole Attack; Hidden Wormhole; Exposed Wormhole;
In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.
Other Latest Articles
Last modified: 2017-04-03 15:32:16