Mobility

Detection Wormhole in Wireless Ad-Hoc Networks

Free registration required

Executive Summary

One of the severe attacks on routing protocols is called wormhole attack in which two or more malicious nodes receive packets at one point of the network and transmit them to another location by a wired or wireless tunnel. The wormhole is so powerful and detection of it is difficult. This attack can form a serious threat in wireless networks, especially against many wireless ad-hoc networks and location-based wireless security systems. There is several wormhole detection methods in the wireless ad-hoc networks which some of them are reviewed in this paper.

  • Format: PDF
  • Size: 450.9 KB