Securing Layer-3 Wormhole Attacks in Ad-Hoc Networks

Download Now
Provided by: International Journal of Modern Engineering Research (IJMER)
Topic: Networking
Format: PDF
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, the authors present a new approach for detecting wormhole attacks. The witness integration multipath protocol is based on the multipath DSR (Dynamic Source Routing) routing protocol and finds suspicious behavior related to wormhole attacks.
Download Now

Find By Topic