ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.7, No. 4)

Publication Date:

Authors : ; ;

Page : 1417-1426

Keywords : Ad-hoc Network; Secure Routing; Wormhole Attack; Hidden Wormhole; Exposed Wormhole;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

Last modified: 2017-04-03 15:32:16