Location of Repository

Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks

By T. Krishna Rao, Mayank Sharma and Dr. M. V. Vijaya Saradhi

Abstract

Abstract- In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, we present a new approach for detecting wormhole attacks. The Witness Integration Multipath protocol is based on the Multipath DSR routing protocol and finds suspicious behavior related to wormhole attacks

Topics: MANET, source routing, multipath, wormhole attacks
Year: 2014
OAI identifier: oai:CiteSeerX.psu:10.1.1.416.6681
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.ijmer.com/papers/vo... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.