Provided by: Auricle Technologies
Date Added: Dec 2013
In this paper, the authors will implement two attacks over mobile ad hoc networks known as wormhole attack and blackhole attack. They will also analyze the impact of these attacks on data communication when using a reactive routing protocol for data communication. The reactive routing protocol used is well known Ad-hoc On-demand Distance Vector (AODV) protocol. In the wormhole attack, at least two malicious nodes i.e., attackers disseminates wrong network information to its neighbors during the routing table formation due to which these attacks become the intermediate nodes on the selected route and drop data packets during the communication process.