Exploration of Wormhole Attack
نویسندگان
چکیده
Security emerges as a central requirementas mobile ad hoc network applications are deployed. In this paper, we introduce the wormhole attack, a severe attack in ad hoc networks that is particularly challenging to defend against. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. It is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality.Wormhole attacks can form a serious threat in wireless networks.
منابع مشابه
A two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملTopological comparison-based wormhole detection for MANET
Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks (MANET). In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormh...
متن کاملReview Paper on Wormhole Attack
A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole A...
متن کاملA Survey of Wormhole Attack and Countermeasures against that in Wireless Ad-hoc Networks
Wormhole attack is a Routing-Disruption Attack in ad hoc networks, those malicious nodes in these networks can bear wormhole attacks to make up a false scenario on neighbor discovery relations among mobile nodes. The attackers endanger the safety of ad hoc routing protocols with making a direct link, referred to as a wormhole tunnel, between malicious nodes. After building a wormhole tunnel, on...
متن کاملA New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks
In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is ...
متن کامل