International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 120 | Views: 335

Comparative Studies | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.4 / 10


     

A Comparative Analysis of Detection and Prevention of Wormhole attacks in Mobile Ad-hoc Networks

Sushant S. Bahekar, Prashant Panse


Abstract: In day to day life the Computer Networks Becomes more popular specially Mobile Ad hoc Networks. Its applicability and popularity attracts some miss users for malfunctioning and disturbing the network traffic. The ad-hoc networks are the temporarily established wireless networks for doing specific task, which do not require fixed Infrastructure. Each mobile node functions as base station and as router forwarding packets for other mobile nodes in network. There are various types of attacks in Mobile networks but among all attacks wormhole attack is most dangerous attack. In this attack an attacker capture the packets at one node in the network and send it to the another attacker node at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. By Using a cryptographic technique is not enough to prevent wormhole attack. In this paper we are going to Comparative Analysis of Detection and prevention techniques of Wormhole attacks trying to find out their pros and cons.


Keywords: Network Security, Tunnels, Packet Encapsulation, Sinkhole, Select forwarding


Edition: Volume 3 Issue 7, July 2014


Pages: 304 - 308



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sushant S. Bahekar, Prashant Panse, "A Comparative Analysis of Detection and Prevention of Wormhole attacks in Mobile Ad-hoc Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 304-308, https://www.ijsr.net/getabstract.php?paperid=20141017, DOI: https://www.doi.org/10.21275/20141017

Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 4 | Weekly Hits: ⮙2 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024

Pages: 779 - 789

Machine Learning-Based Detection of Synonymous IP Flood Attacks on Server Infrastructure

Surbhi Batra, Chandra Sekhar Dash

Share this Article

Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Analysis Study Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 13 Issue 3, March 2024

Pages: 1927 - 1929

Optimizing Network Security through Inline Sandbox Deployment: A Practical Approach with Trellix

Tahir Bashir

Share this Article

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 882 - 886

Maximizing Cyber Security through Machine Learning and Data Analysis for Advanced Threat Detection and Mitigation

Manupreet Kaur

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1728 - 1731

Key Management in Wireless Sensor Networks - A Review

Majida C V, Sandhya V

Share this Article



Top