Open Access Open Access  Restricted Access Subscription Access

Cutting back the Wormhole Attack in Mobile Network: A Survey


Affiliations
1 Department of CSE, GZS PTU Campus, Bathinda, Punjab, India
 

As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.

This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.


Keywords

Wireless Network, Wormhole Attack.
User
Notifications
Font Size

Abstract Views: 143

PDF Views: 1




  • Cutting back the Wormhole Attack in Mobile Network: A Survey

Abstract Views: 143  |  PDF Views: 1

Authors

Ramandeep Kaur
Department of CSE, GZS PTU Campus, Bathinda, Punjab, India
Anita
Department of CSE, GZS PTU Campus, Bathinda, Punjab, India
Abhilasha
Department of CSE, GZS PTU Campus, Bathinda, Punjab, India

Abstract


As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.

This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.


Keywords


Wireless Network, Wormhole Attack.