A SURVEY ON DELAY AND NEIGHBOR NODE MONITORING BASED WORMHOLE ATTACK PREVENTION AND DETECTION

ICTACT Journal on Communication Technology ( Volume: 7 , Issue: 4 )

Abstract

vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff0a3e220000005080050001000800
In Mobile Ad-hoc Networks (MANET), network layer attacks, for example wormhole attacks, disrupt the network routing operations and can be used for data theft. Wormhole attacks are of two types: hidden and exposed wormhole. There are various mechanisms in literature which are used to prevent and detect wormhole attacks. In this paper, we survey wormhole prevention and detection techniques and present our critical observations for each. These techniques are based on cryptographic mechanisms, monitoring of packet transmission delay and control packet forwarding behavior of neighbor nodes. We compare the techniques using the following criteria- extra resources needed applicability to different network topologies and routing protocols, prevention/detection capability, etc. We conclude the paper with potential research directions.

Authors

Sudhir T Bagade1, Vijay T Raisinghani2
Usha Mittal Institute of Technology, India1, School of Engineering, Narsee Monjee Institute of Management Studies, India2

Keywords

Ad-hoc Network, Secure Routing, Wormhole Attack, Hidden Wormhole, Exposed Wormhole

Published By
ICTACT
Published In
ICTACT Journal on Communication Technology
( Volume: 7 , Issue: 4 )
Date of Publication
December 2016
Pages
1417-1426