ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network

Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.4, No. 6)

Publication Date:

Authors : ; ; ;

Page : 153-157

Keywords : Key words: wormhole attack; Delay Tolerant Network; Unit Disk Graph.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

ABSTRACT Wireless communication faces several security risks. In this paper, we are concerned of a particularly severe security attack that affects the Delay Tolerant Networks routing protocols, it is called the wormhole attack. The algorithm uses the local connectivity information to look for forbidden substructures in the network connectivity graph. Our proposed methodology is wholly localized and it does not use any special hardware or location information of the nodes, making this technique universally applicable. The objective of this paper is to develop a methodology to detect the presence of malicious nodes, causing forbidden structure in the network, using only local connectivity information.

Last modified: 2016-01-08 14:33:58