Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2012, Vol 2, Issue 1
Abstract
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, we present a new approach for detecting wormhole attacks. The Witness Integration Multipath protocol is based on the Multipath DSR routing protocol and finds suspicious behavior related to wormhole attacks.
Authors and Affiliations
T. Krishna Rao , Mayank Sharma , Dr. M. V. Vijaya Saradhi
A Novel Data Extraction and Alignment Method for Web Databases
Online databases, also called web databases, comprise the deep web tag and value. Compared with WebPages in the surface web, which can be accessed by using a unique URL, pages in the deep web are dynamically genera...
Performance and Analysis of OFDM Signal Using Matlab Simulink
Multi-carrier modulation is an attractive technique for fourth generation .OFDM is based on multicarrier modulation technique. In OFDM system the bit stream is divided into many different sub channels. An effic...
An insight on transparent antennas
This paper mainly discusses about the Transparent Antenna’s introduction, design, their feeding methods, the future scope and finally transition from 2D to 3D
SOME IMPUTATION METHODS IN DOUBLE SAMPLING SCHEME FOR ESTIMATION OF POPULATION MEAN
To estimate the population mean with imputation, i.e. the technique of substituting missing data, there are a number of techniques available in literature like Ratio method of imputation, Compromised method of impu...
Bolted Joints Analysis Methods and Evaluation
Calculation of accurate bolt forces is the primary requirement in many industries. All the theoretical calculations for bolt forces, includes many significant assumption based on idealized mechanical models. In...