Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Survey on Delay and Neighbor Node Monitoring Based Wormhole Attack Prevention and Detection


Affiliations
1 Department of Computer Science and Technology, Usha Mittal Institute of Technology, India
2 Department of Information Technology, School of Engineering, Narsee Monjee Institute of Management Studies, India
     

   Subscribe/Renew Journal


In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

Keywords

Ad-hoc Network, Secure Routing, Wormhole Attack, Hidden Wormhole, Exposed Wormhole.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 334

PDF Views: 1




  • A Survey on Delay and Neighbor Node Monitoring Based Wormhole Attack Prevention and Detection

Abstract Views: 334  |  PDF Views: 1

Authors

Sudhir T. Bagade
Department of Computer Science and Technology, Usha Mittal Institute of Technology, India
Vijay T. Raisinghani
Department of Information Technology, School of Engineering, Narsee Monjee Institute of Management Studies, India

Abstract


In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

Keywords


Ad-hoc Network, Secure Routing, Wormhole Attack, Hidden Wormhole, Exposed Wormhole.