Download Now Free registration required
This paper emphasized to propose and develop a scheme for the prevention of wormhole attack from intermediate and surrounding threads. In wireless ad hoc networks, it is difficult to detect wormhole attacks because malicious nodes impersonate legitimate nodes. Various issues including security, legitimacy and node concurrency still persist in mobile ad hoc networks among these, security being one of the major concerns. The wormhole attack is among the most threatening and dangerous attacks on these types of networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another distant malicious node, which replays them locally.
- Format: PDF
- Size: 54.5 KB