To see the other types of publications on this topic, follow the link: Wormhole Attack.

Journal articles on the topic 'Wormhole Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wormhole Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (June 29, 2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a network consisting of a group of mobile nodes that don't have a fixed infrastructure. This causes the MANET to be vulnerable to attacks that can interfere with the process of communication and data transmission on the network. One type of attack that can attack the MANET is a wormhole attack. The wormhole is an attack on a network where there are two or more wormhole nodes that are interconnected and work together to attack network traffic or discard data packets it receives. Each wormhole node will be connected to each other using a wormhole link. To prevent wormhole attacks, the method that can be used is the Delay Per Hop Indicator (Delphi) method and the Round Trip Time and Topological Comparison (RTT-TC) method. The Delphi detects wormhole attacks by calculating the delay in each hop from the source node to the destination node. Whereas in the RTT-TC, wormhole attacks are detected by calculating the value of round trip time and topological comparison. The Delphi and RTT-TC methods have their advantages and disadvantages. In this study, it was proposed to combine the Delphi and RTT-TC methods to cover the disadvantage of each method.
APA, Harvard, Vancouver, ISO, and other styles
2

Mukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.

Full text
Abstract:
In wireless communication, wormhole attack is a crucial threat that deteriorates the normal functionality of the network. Invasion of wormholes destroys the network topology completely. However, most of the existing solutions require special hardware or synchronized clock or long processing time to defend against long path wormhole attacks. In this work, we propose a wormhole detection method using range-based topology comparison that exploits the local neighbourhood subgraph. The Round Trip Time (RTT) for each node pair is gathered to generate neighbour information. Then, the network is reconstructed by ordinal Multidimensional Scaling (MDS) followed by a suspicion phase that enlists the suspected wormholes based on the spatial reconstruction. Iterative computation of MDS helps to visualize the topology changes and can localize the potential wormholes. Finally, a verification phase is used to remove falsely accused nodes and identify real adversaries. The novelty of our algorithm is that it can detect both short path and long path wormhole links. Extensive simulations are executed to demonstrate the efficacy of our approach compared to existing ones.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.

Full text
Abstract:
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
4

Luan, Liang Yu, Ying Fang Fu, Peng Xiao, and Ling Xi Peng. "Preventing Wormhole Attacks in Wireless Mesh Networks." Applied Mechanics and Materials 443 (October 2013): 440–45. http://dx.doi.org/10.4028/www.scientific.net/amm.443.440.

Full text
Abstract:
In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.
APA, Harvard, Vancouver, ISO, and other styles
5

K*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.

Full text
Abstract:
In the current world people are using the sensing networks called IoT and WSN as the subset of IoT in various applications. The employment of these sensor networks is rapidly increasing. Due to the longer usage of these sensor networks security issues are eventually happening and has the possibility of developing the attacks in the network. In this review, focuses on wormhole attacks in wireless sensor network (WSN) and Internet of Things (IoT) creating a tunnels i.e., wormhole link in between source and the destination node in the network. The classification of wormhole attack in both WSN and IoT are presented based on the mode of attacker. The detection mechanisms of wormhole attack are specified in both WSN and IoT. It hypothesizes the detection strength is more in IoT than the WSN based on the analysis, the parameters of the detection algorithm that the WSN is about 20% while in IoT is 70%.
APA, Harvard, Vancouver, ISO, and other styles
6

Neerugatti, Vikram, and A. Rama Mohan Reddy. "Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 100–104. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2075.

Full text
Abstract:
Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
8

Peda Gopi, A., E. Suresh Babu, C. Naga Raju, and S. Ashok Kumar. "Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 5 (October 1, 2015): 1111. http://dx.doi.org/10.11591/ijece.v5i5.pp1111-1118.

Full text
Abstract:
Mobile ad-hoc networks are self-organized infrastructure less networks that consists of mobile nodes, which are capable of maintaining and forming the network by themselves. Recently, researchers are designed several routing protocols on these networks. However, these routing protocols are more vulnerable to attacks from the intruders, which can easily paralyze the operation of the network due to its inherited characteristics of MANETS. One such type of attack is wormhole attack. Because of its severity, the wormhole attack has attracted a great deal of attention in the research community. This paper compares reactive and proactive routing protocols in adversarial environment. Specifically, wormhole attack is applied to these routing protocols to evaluate its performance through simulation. Comprehensively the results shows the comparative performance of these protocols against wormhole attack is hard to detect and easy to implement.
APA, Harvard, Vancouver, ISO, and other styles
9

Divekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.

Full text
Abstract:
It has been observed that IP networks are vulnerable to many kinds of attacks. Among the various attacks possible in IP networks wormhole attack is one which is treated as a very severe attack. In LOLS, multiple failures are handled but network attack is not detected. LOLS cannot handle any kind of attack and this is the reason why we are working on wormhole attack and its detection by using AOMDV algorithm. In this attack a harmful node records packets at one end in the network and tunnels them to another harmful node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack while data transfer . In this paper one mechanism is used, which is based on the total round trip time (RTT) of current route and the average round trip times This mechanism works for both mobile ad hoc networks and wireless ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Ramírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.

Full text
Abstract:
One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. An empirical method to launch a successful attack on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted in this work to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.
APA, Harvard, Vancouver, ISO, and other styles
11

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/3548607.

Full text
Abstract:
In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS) that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack). For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.
APA, Harvard, Vancouver, ISO, and other styles
12

Singh, Surinder, and Hardeep Singh Saini. "Security Techniques for Wormhole Attack in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 2.23 (April 20, 2018): 59. http://dx.doi.org/10.14419/ijet.v7i2.23.11884.

Full text
Abstract:
The wireless sensor network has group of sensors which can sense the data and route this data to base station. As there is no physical connection between sensor and base station the important data can be routed without wires. The broadcast nature of wireless sensor network makes it prone to security threat to the valuable data. The attacker node can detect the data by creating their own data aggregation and routing mechanism .The number of attacks can be possible on the network layer. Out of these attacks wormhole is one of the major attack which can change the routing method of the whole wireless sensor network. In this attack,the attacker node can control the packet transmission of whole network and route it to the tunnel of nodes. The major drawback of this attack is to increase the packet drop and disturbing the routing mechanism. A number of security techniques are developed by the researcher to reduce the packet drop ratio and secure the routing mechanism of the network. Out of all thesetechniquesfew related to packet drop ratio are discussed in this paper. TheLightweight countermeasure for the wormhole attack (LITEWORP) based on Dynamic Source routing (DSR) protocol security technique,Delay Per Hop Indication (Delphi) based on AODV(Avoidance Routing Protocol) Protocol security technique and MOBIWORP based on DSRprotocol security technique reduce the packet loss percentage 40%,43% and 35% respectively.
APA, Harvard, Vancouver, ISO, and other styles
13

Khan, Zubair Ahmed, Saeed-ur - Rehman, and Muhammad Hasan Islam. "An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack." July 2016 35, no. 3 (July 1, 2016): 359–72. http://dx.doi.org/10.22581/muet1982.1603.06.

Full text
Abstract:
MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.
APA, Harvard, Vancouver, ISO, and other styles
14

Mei, Song, Jiang Yuan, Feng Wu, and Wei Ling Wang. "A Wireless Wormhole Detection Model Based on Packet Leashes." Advanced Materials Research 660 (February 2013): 212–16. http://dx.doi.org/10.4028/www.scientific.net/amr.660.212.

Full text
Abstract:
With the widely range of applications of wireless ad hoc networks, security threats are increasingly prominent, especially wormhole attacks. In a wormhole attack, unauthenticated entities secretly built wormhole tunnels, silently received messages and selectively reply. In this paper, we introduce an approach to detect and defense against wormhole attacks based on packet leashes scheme. Our solution effectively integrated shared symmetric key authentication and TIK protocol to reduce transmission delay and energy consumption. The result shows that the model can save power and reduce communication delay without sacrificing the accuracy of detection.
APA, Harvard, Vancouver, ISO, and other styles
15

Ghugar, Umashankar, and Jayaram Pradhan. "Survey of wormhole attack in wireless sensor networks." Computer Science and Information Technologies 2, no. 1 (March 1, 2021): 33–42. http://dx.doi.org/10.11591/csit.v2i1.p33-42.

Full text
Abstract:
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

Aneja, Darpan, Love Kumar, and Vishal Sharma. "A Cluster Based Approach for Detection and Protection of Wormhole Attack in Wireless Sensor Network." Sensor Letters 17, no. 12 (December 1, 2019): 955–64. http://dx.doi.org/10.1166/sl.2019.4184.

Full text
Abstract:
Wireless Sensor Network (WSN) technology is progressing at a rapid pace and its demand is also increasing massively due to its cost-effective nature and less-challenging installation demands. However, due to its vulnerable wireless environment, WSNs are prone to various types of severely damaging attacks like wormhole, sinkhole, Denial of Service (DoS) etcetera. Therefore, it requires to be more secure and confidential to maintain the productive flow of communication between the nodes. One of the greatest threats which if placed strategically can seriously impair the network is the wormhole attack. In this paper, we proposed a cluster based technique to detect and protect WSN from wormhole attacks. The entire network is divided into clusters eventually at the end and each cluster is governed by a cluster head (CH). Based on Round Trip Time and hop count the security of the network has enhanced and nullified the wormhole attack in the network. A significant improvement in throughput, PDR, Delay has been observed and reported with proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
17

Kadian, Garima, and Dinesh Singh. "Review Paper on Wormhole Attack." International Journal of Computer Applications 131, no. 13 (December 17, 2015): 26–31. http://dx.doi.org/10.5120/ijca2015907529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Zheng, Zheng Jian. "A Wormhole Attack Defense Strategy of WSN Based on Node Location Information." Advanced Materials Research 268-270 (July 2011): 1055–60. http://dx.doi.org/10.4028/www.scientific.net/amr.268-270.1055.

Full text
Abstract:
Wormhole attack is a kind of attack manner in WSN that does not need to crack network encryption key, which has great harm. Aiming at the characteristics of Wormhole attack, a wormhole attack defense strategy based on node location information was presented. The manner computed physical distance between two nodes through extraction of location information in the packets and compared it with stored threshold, so as to determine whether these packets come from normal communication range. WSN network modeling and simulation results based on OMNeT++ indicates that AODV protocol of defense strategy added sensor node location information can implement successfully defense.
APA, Harvard, Vancouver, ISO, and other styles
19

Rezaei, F., and A. Zahedi. "Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes." Engineering, Technology & Applied Science Research 7, no. 4 (August 9, 2017): 1771–74. http://dx.doi.org/10.48084/etasr.1118.

Full text
Abstract:
One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this attack, the enemy deploys two malicious nodes in two different areas of the network and establishes a high-speed dedicated channel between these two. This will cause the normal nodes in two different areas wrongly think that they are two-hop neighbors. Therefore, this attack will greatly affect the routing algorithms. In this paper, a new distributed algorithm is provided to deal with the wormhole attack. The main idea of the proposed algorithm is to discover separate routes between pairs of two-hop neighboring nodes. The proposed algorithm was implemented and evaluated in terms of true and false detection rate by performing a series of experiments and the results were compared with the base algorithm. The test results showed that the proposed algorithm has desirable efficacy.
APA, Harvard, Vancouver, ISO, and other styles
20

Palacharla, Swetha, M. Chandan, K. GnanaSuryaTeja, and G. Varshitha. "Wormhole Attack: a Major Security Concern in Internet of Things (Iot)." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 147. http://dx.doi.org/10.14419/ijet.v7i3.27.17748.

Full text
Abstract:
The Internet of Things (IoT) is nothing but a collection of wireless and wired devices, commonly termed as nodes operated remotely. This operation is done by assuming these nodes as the sensors in a wireless sensor network (WSN) administered through a base station. We start with briefing about IoT and then briefing IoT layer models. After this, we discuss attacks with regard to IoT namely Sinkhole attack, Sybil attack, HELLO flood attack, Acknowledgement spoofing attack and their respective detection methods. This paper is systematic review of existing mechanism for the detection of wormhole attack and a new method is proposed.
APA, Harvard, Vancouver, ISO, and other styles
21

Liang, Hong, Hong Fan, and Fu Cai. "Defending against wormhole attack in OLSR." Geo-spatial Information Science 9, no. 3 (January 2006): 229–33. http://dx.doi.org/10.1007/bf02826773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Liu, Shuan. "Exploration of Wireless Sensor Network Based on RSSI Positioning Algorithm." International Journal of Online Engineering (iJOE) 14, no. 11 (November 10, 2018): 133. http://dx.doi.org/10.3991/ijoe.v14i11.9519.

Full text
Abstract:
<p class="0abstract"><span lang="EN-US">Based on the security of the receiving signal strength indicator positioning algorithm, the RSSI positioning algorithm in the environment of witch attack, wormhole attack and replication attack has largely failed</span><span lang="EN-US">.</span><span lang="EN-US">Although existing security </span><span lang="EN-US">positioning</span><span lang="EN-US"> algorithms can effectively prevent attacks from occurring, the massive consumption of network resources can’t be ignored.</span><span lang="EN-US">Therefore, a tolerable security positioning method is proposed for each of the three attacks in order to improve the security of positioning.</span><span lang="EN-US">According to the node's physical information, the attack node is detected.</span><span lang="EN-US">Through simulation experiments, compared with the traditional indoor security </span><span lang="EN-US">positioning</span><span lang="EN-US"> method, the proposed algorithm can significantly reduce the intervention of witch attack, wormhole attack and replication attack on positioning error.</span><span lang="EN-US">While achieving the goal of combating attacks, it reduces the computational complexity, decreases node energy consumption, and extends the network life cycle.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
23

Sehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Impact of selective forwarding attack on AODV protocol in mobile wireless senor networks." International Journal of Engineering & Technology 7, no. 2.4 (March 10, 2018): 157. http://dx.doi.org/10.14419/ijet.v7i2.4.13029.

Full text
Abstract:
wireless sensor network is the growing field of research having capacity to help the mankind with its usage in varied areas like military surveillance, medical etc. However these networks are vulnerable to certain attacks like black hole, wormhole and selective forwarding. In this paper selective forwarding attack is analyzed on varying number of attacker nodes and its impact on different performance parameters. It is concluded that the performance of the entire network is degraded with the increase in the number of malicious nodes.
APA, Harvard, Vancouver, ISO, and other styles
24

Kori, Sharada, Krishnamurthy G N, and Nandini Sidnal. "Distributed Wormhole Attack Mitigation Technique in WSNs." International Journal of Computer Network and Information Security 11, no. 5 (May 8, 2019): 20–27. http://dx.doi.org/10.5815/ijcnis.2019.05.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Mariappan, L. Thanga, and K. Rubasoundar. "Isolating Wormhole Attack in Wireless Sensor Networks." Circuits and Systems 07, no. 08 (2016): 2036–46. http://dx.doi.org/10.4236/cs.2016.78177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Chiu, Hon Sun, King-Shan Lui, and Kwan L. Yeung. "DelPHIX: A Simple and Efficient Mechanism for Wormhole Detection in Ad Hoc Networks." Journal of Communications Software and Systems 2, no. 2 (April 5, 2017): 131. http://dx.doi.org/10.24138/jcomss.v2i2.296.

Full text
Abstract:
Data transmission in a mobile ad hoc network is performed within an untrusted wireless environment. It is subjected to many kinds of security attacks. In a wormhole attack, two malicious nodes work together to tunnel packets from one to the other, making other nodes perceive a path to have a smaller hop count. We identify two types of wormhole attacks. In the first type, malicious nodes do not expose themselves in route finding process and legitimate nodes do not know their existence. In the second type, malicious nodes do create route advertisements and legitimate nodes are aware of the existence of malicious nodes, just do not know they are malicious. Existing solutions usually can identify only one kind of attacks. In this paper, we propose a simple and efficient detection method called DelPHIX. Byobserving the delays of different paths to the receiver, the sender is able to detect both kinds of wormhole attacks. This method requires neither synchronized clocks nor special hardware to be equipped in mobile nodes. The performance of DelPHIX is justified by simulations.
APA, Harvard, Vancouver, ISO, and other styles
27

Ngoc, Luong Thai, and Vo Thanh Tu. "A NOVEL ALGORITHM BASED ON TRUST AUTHENTICATION MECHANISMS TO DETECT AND PREVENT MALICIOUS NODES IN MOBILE AD HOC NETWORK." Journal of Computer Science and Cybernetics 33, no. 4 (May 11, 2018): 357–78. http://dx.doi.org/10.15625/1813-9663/33/4/10759.

Full text
Abstract:
Ad hoc On-demand Distance Vector (AODV) routing protocol is one of the most popular reactive protocol used for Mobile Ad hoc Network, is target of many attack types. Some research works published related to improve of AODV based on digital signature, typical as SAODV and ARAN. However, they have some weakness, malicious can pass over security wall of SAODV by using fake keys, both of SAODV and ARAN can't detect wormhole nodes in hide mode. In additions, detection solutions based on characteristics of attack types have proposed, they only bring about efficiency for each independent type of attack and malicious nodes can join to the discovered route by deliberately giving fake information concerning. This article proposes a trust authentication mechanisms (TAM) using public-key cryptograms RSA and digital certificates (DC) based on X509 standard. TAM allows a mobile node authenticates preceding nodes by checking control route packets through 3 steps: (1) Digital certificates; (2) actual neighbors; and (3) packet integrity authentications. Analysis results confirm that TAM can detect and prevent almost current routing protocol attack types, such as Blackhole/ Sinkhole, Grayhole, Flooding, Whirlwind and participation mode Wormhole attacks. Specially, the simulation results in NS2 show that TAM can detect and prevent successful to 100\% malicious nodes using fake keys for all scenarios based on the number of UDP connections, 100% hide mode wormhole nodes for immobility scenarios and above 99% (the mistaken rate below 1.0%) for all mobility scenarios with 30m/s of maximum speeds and 1hop minimum tunnel length.
APA, Harvard, Vancouver, ISO, and other styles
28

Matam, Rakesh, and Somanath Tripathy. "Secure Multicast Routing Algorithm for Wireless Mesh Networks." Journal of Computer Networks and Communications 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/1563464.

Full text
Abstract:
Multicast is an indispensable communication technique in wireless mesh network (WMN). Many applications in WMN including multicast TV, audio and video conferencing, and multiplayer social gaming use multicast transmission. On the other hand, security in multicast transmissions is crucial, without which the network services are significantly disrupted. Existing secure routing protocols that address different active attacks are still vulnerable due to subtle nature of flaws in protocol design. Moreover, existing secure routing protocols assume that adversarial nodes cannot share an out-of-band communication channel which rules out the possibility of wormhole attack. In this paper, we propose SEMRAW (SEcure Multicast Routing Algorithm for Wireless mesh network) that is resistant against all known active threats including wormhole attack. SEMRAW employs digital signatures to prevent a malicious node from gaining illegitimate access to the message contents. Security of SEMRAW is evaluated using the simulation paradigm approach.
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Shu, and Rui Jiang. "Security Analysis and Improvement of Secure and Dynamic Clustering Protocol." Applied Mechanics and Materials 48-49 (February 2011): 1014–17. http://dx.doi.org/10.4028/www.scientific.net/amm.48-49.1014.

Full text
Abstract:
In this paper, we analyze a secure and dynamic clustering protocol SecDEACH. Through analysis, we show that the protocol is vulnerable to the wormhole attack since it does not consider the verification of the neighbor nodes within its radio range. We give a wormhole attack to the protocol and propose an improved version which can keep the frame of the SecDEACH protocol and overcome the security shortages. Finally, we make an analysis of the improved protocol and conclude the paper.
APA, Harvard, Vancouver, ISO, and other styles
30

Raote, Nisha S. "Defending Wormhole Attack in Wireless Ad-hoc Network." International Journal of Computer Science & Engineering Survey 2, no. 3 (August 30, 2011): 143–48. http://dx.doi.org/10.5121/ijcses.2011.2311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Dhara Buch and Devesh Jinwala. "Prevention of Wormhole Attack in Wireless Sensor Network." International Journal of Network Security & Its Applications 3, no. 5 (September 30, 2011): 85–98. http://dx.doi.org/10.5121/ijnsa.2011.3507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Nikam, Shahuraje, and Anshul Sarawagi. "Security over Wormhole Attack in VANET Network System." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 8 (August 30, 2017): 196. http://dx.doi.org/10.23956/ijarcsse.v7i8.50.

Full text
Abstract:
VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network
APA, Harvard, Vancouver, ISO, and other styles
33

Ahmad, Gulzar, and Sanjay Jamwal. "Examination of AODV Routing Protocol with Wormhole Attack." International Journal of Computer Applications 135, no. 5 (February 17, 2016): 31–35. http://dx.doi.org/10.5120/ijca2016908415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Tiruvakadu, Divya Sai Keerthi, and Venkataram Pallapa. "Confirmation of wormhole attack in MANETs using honeypot." Computers & Security 76 (July 2018): 32–49. http://dx.doi.org/10.1016/j.cose.2018.02.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Sharma, Vishal, Dushantha Nalin K. Jayakody, Kathiravan Srinivasan, and Ravinder Kumar. "Coagulation Attacks over Networked UAVs: Concept, Challenges, and Research Aspects." International Journal of Engineering & Technology 7, no. 3.13 (July 27, 2018): 183. http://dx.doi.org/10.14419/ijet.v7i3.13.17329.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) have grasped an important role in the modern day networking. A lot of applications are being developed using aerial vehicles as a pivot. These vehicles provide a vast range of support to modern day networks. Modern computing applications such as Urban Computing, Internet of Things, Ubiquitous Computing, and the Internet for All have sought applications of UAVs to attain complex tasks. However, securing aerial vehicles in a network is not an easy task because of the difference in communication standards and range of applicability. Aerial nodes are prone to various types of attack in a network such as Sybil attack, wormhole attack, sinkhole attack, or impersonation attack. These attacks lead to a large number of vulnerabilities causing fatal incidents. A new attack is introduced in this paper termed as "Coagulation Attack". This term is derived from the clotting properties of fluids. This paper introduces the concept, issues, challenges, and research aspects of coagulation attack. A simulation study is also presented that shows the impact of such attacks over networked UAVs.
APA, Harvard, Vancouver, ISO, and other styles
36

Gandhi, Kaushal, Rajneesh Narula, Sumeer Khullar, and Anish Arora. "Security Issues of Routing Protocols in MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 2 (October 30, 2012): 339–42. http://dx.doi.org/10.24297/ijct.v3i2c.2894.

Full text
Abstract:
There are a number of routing protocols developed by researchers. Due to the nature of ad hoc networks, secure routing is an important area of research in developing secure routing protocols. Although researchers have proposed several secure routing protocols, their resistance towards various types of security attacks and efficiency are primary points of concern in implementing these protocols. This paper presents some of the available secure routing protocols and most common attack patterns against ad hoc networks. Routing protocols are subjected to case studies against the most commonly identified attack patterns such as: denial-of-service attack, tunneling, spoofing, black hole attack and wormhole attack etc. In MANET, the nodes also function as routers that discover and maintain routes to other nodes in the network. Establishing an optimal and efficient route between the communicating parties is the primary concern of the routing protocols of MANET. Any attack in routing phase may disrupt the overall communication and the entire network can be paralyzed. Thus, security in network layer plays an important role in the security of the whole network. A number of attacks in network layer have been identified and studied in security research. An attacker can absorb network traffic, inject themselves into the path between the source and destination and thus control the network traffic flow.
APA, Harvard, Vancouver, ISO, and other styles
37

Ratnasih, Ratnasih, Doan Perdana, Triani Wulandari, and M. Irfan Pratama. "Performance Analysis of Reactive Routing Protocol on VANET with Wormhole Attack Schemeaper." JURNAL INFOTEL 10, no. 3 (August 28, 2018): 138. http://dx.doi.org/10.20895/infotel.v10i3.384.

Full text
Abstract:
Entering the information era, the current needs of global community is increasing very rapidly. Vehicular Ad-hoc Networks (VANET) has drawn significant attentions from both industry and academia as an important developmnt of vehicular communication technology. VANET is one of open network and communication media without security mechanism. There are many kinds of security threat that can interrupt data communication in VANET. Wormhole attacks as one of security threat can be a good challenge in VANET security research. In this paper, we evaluate performance of reactive routing protocol on VANET with wormhole attack scheme. The project is simulated using NS-3 in Ubuntu platform with performance analysis of routing protocol by changing of initial power and node density. We conclude that throughput values are increasing along with the changing of initial power while the delay values are decreasing rapidly. By the changing of node density, the highest delay value is 0.122 ns on 10 nodes condition and 0.215 Mbps for throughput value on 8 nodes condition.
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Mukesh, and Kamlesh Dutta. "Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN." International Journal of Information Security and Privacy 11, no. 1 (January 2017): 35–51. http://dx.doi.org/10.4018/ijisp.2017010103.

Full text
Abstract:
Wireless networks are used by everyone for their convenience for transferring packets from one node to another without having a static infrastructure. In WSN, there are some nodes which are light weight, small in size, having low computation overhead, and low cost known as sensor nodes. In literature, there exists many secure data aggregation protocols available but they are not sufficient to detect the malicious node. The authors require a better security mechanism or a technique to secure the network. Data aggregation is an essential paradigm in WSN. The idea is to combine data coming from different source nodes in order to achieve energy efficiency. In this paper, the authors proposed a protocol for worm hole attack detection during data aggregation in WSN. Main focus is on wormhole attack detection and its countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
39

Singh, Sukhwinder, and Rajnish Kansal. "Novel Technique for Detection of Wormhole Attack in MANET." International Journal of Computer Sciences and Engineering 6, no. 11 (November 30, 2018): 464–68. http://dx.doi.org/10.26438/ijcse/v6i11.464468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Xiaoying, and Qixiang Song. "An Improved DV-Hop Algorithm for Resisting Wormhole Attack." Open Cybernetics & Systemics Journal 9, no. 1 (September 18, 2015): 1443–48. http://dx.doi.org/10.2174/1874110x01509011443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kr.Shrivastava, Ashish, and Neha Jain. "Study of Wormhole Attack in Mobile Ad-Hoc Network." International Journal of Computer Applications 73, no. 12 (July 26, 2013): 32–37. http://dx.doi.org/10.5120/12795-0138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Goyal, Sweety, and Harish Rohil. "Securing MANET against Wormhole Attack using Neighbor Node Analysis." International Journal of Computer Applications 81, no. 18 (November 22, 2013): 44–48. http://dx.doi.org/10.5120/14227-2478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sharif, Lukman, and Munir Ahmed. "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)." Journal of Information Processing Systems 6, no. 2 (June 30, 2010): 177–84. http://dx.doi.org/10.3745/jips.2010.6.2.177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Upadhyay, Saurabh. "Avoiding Wormhole Attack in MANET using Statistical Analysis Approach." International Journal on Cryptography and Information Security 2, no. 1 (March 31, 2012): 15–23. http://dx.doi.org/10.5121/ijcis.2012.2102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Kumar, Mohit, and Nidhi Shalya. "Securing AODV against Wormhole Attack using Token based Approach." International Journal of Applied Information Systems 4, no. 10 (December 15, 2012): 24–27. http://dx.doi.org/10.5120/ijais12-450807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Sundaravadivel, K. "IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK." ICTACT Journal on Communication Technology 10, no. 1 (March 1, 2019): 1929–35. http://dx.doi.org/10.21917/ijct.2019.0283.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Kaur, Parvinder, Dalveer Kaur, and Rajiv Mahajan. "Wormhole Attack Detection Technique in Mobile Ad Hoc Networks." Wireless Personal Communications 97, no. 2 (July 6, 2017): 2939–50. http://dx.doi.org/10.1007/s11277-017-4643-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Shrivastava, Akansha, and Rajni Dubey. "Wormhole Attack in Mobile Ad-hoc Network: A Survey." International Journal of Security and Its Applications 9, no. 7 (July 31, 2015): 293–98. http://dx.doi.org/10.14257/ijsia.2015.9.7.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ji, Shiyu, Tingting Chen, and Sheng Zhong. "Wormhole Attack Detection Algorithms in Wireless Network Coding Systems." IEEE Transactions on Mobile Computing 14, no. 3 (March 1, 2015): 660–74. http://dx.doi.org/10.1109/tmc.2014.2324572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Pahal, Vishal, and Susheel Kumar. "Degradation of Ad-hoc Network Performance under Wormhole Attack." International Journal of Computer Applications 49, no. 13 (July 28, 2012): 25–29. http://dx.doi.org/10.5120/7687-0997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography