Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Wormhole Detection Methods-A Survey


Affiliations
1 Karunya University, Coimbatore 641114, India
     

   Subscribe/Renew Journal


The dynamic and cooperative nature of ad hoc networks presents considerable challenges in securing and detecting attacks in these networks. A security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack, a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point. Wormhole nodes can grab the route from the source node to the destination node, then it drop, or sniff the packets. A wormhole attack poses various threats and it is difficult to prevent. Many techniques have been evolved to detect wormhole attack. This paper presents a survey of various techniques used to detect wormhole attacks. Based on the metrics like packet loss rate, Throughput and Detection rate a comparative study is also done.

Keywords

Mobile Ad hoc Network, Wormhole Attack.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 183

PDF Views: 3




  • Wormhole Detection Methods-A Survey

Abstract Views: 183  |  PDF Views: 3

Authors

J. M. Lifna Prema
Karunya University, Coimbatore 641114, India
J. Immanuel John Raja
Karunya University, Coimbatore 641114, India
S. Sowmya
Karunya University, Coimbatore 641114, India

Abstract


The dynamic and cooperative nature of ad hoc networks presents considerable challenges in securing and detecting attacks in these networks. A security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack, a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point. Wormhole nodes can grab the route from the source node to the destination node, then it drop, or sniff the packets. A wormhole attack poses various threats and it is difficult to prevent. Many techniques have been evolved to detect wormhole attack. This paper presents a survey of various techniques used to detect wormhole attacks. Based on the metrics like packet loss rate, Throughput and Detection rate a comparative study is also done.

Keywords


Mobile Ad hoc Network, Wormhole Attack.