Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2012, Vol 2, Issue 1

Abstract

 In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, we present a new approach for detecting wormhole attacks. The Witness Integration Multipath protocol is based on the Multipath DSR routing protocol and finds suspicious behavior related to wormhole attacks.

Authors and Affiliations

T. Krishna Rao , Mayank Sharma , Dr. M. V. Vijaya Saradhi

Keywords

Related Articles

 A Novel Data Extraction and Alignment Method for Web Databases

 Online databases, also called web databases, comprise the deep web tag and value. Compared with WebPages in the surface web, which can be accessed by using a unique URL, pages in the deep web are dynamically genera...

 Performance and Analysis of OFDM Signal Using Matlab Simulink

 Multi-carrier modulation is an attractive technique for fourth generation .OFDM is based on multicarrier modulation technique. In OFDM system the bit stream is divided into many different sub channels. An effic...

An insight on transparent antennas

This paper mainly discusses about the Transparent Antenna’s introduction, design, their feeding methods, the future scope and finally transition from 2D to 3D

 SOME IMPUTATION METHODS IN DOUBLE SAMPLING SCHEME FOR ESTIMATION OF POPULATION MEAN

 To estimate the population mean with imputation, i.e. the technique of substituting missing data, there are a number of techniques available in literature like Ratio method of imputation, Compromised method of impu...

Bolted Joints Analysis Methods and Evaluation

Calculation of accurate bolt forces is the primary requirement in many industries. All the theoretical calculations for bolt forces, includes many significant assumption based on idealized mechanical models. In...

Download PDF file
  • EP ID EP157894
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

T. Krishna Rao, Mayank Sharma, Dr. M. V. Vijaya Saradhi (2012).  Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks. International Journal of Modern Engineering Research (IJMER), 2(1), 230-234. https://europub.co.uk/articles/-A-157894