2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM) 2010
DOI: 10.1109/cisim.2010.5643657
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive review on wormhole attacks in MANET

Abstract: AsMANETs use wireless medium for communication, these are vulnerable to many security attacks. In this paper a comprehensive review is done on the very recent state of the art research results on wormhole attacks and relevant mitigation measures. 100% of the works reviewed here are published in last five years, out of which 80% are published in last three years. The simulation results in NS2 helps to quantify the comparative performances of the different solutions proposed.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(28 citation statements)
references
References 10 publications
0
28
0
Order By: Relevance
“…This network has created with the wireless equipments. The major advantage of this network is-it is infrastructure less, it can be self-deploy and it doesn't need a centralized authority [1].along with that there are many important characteristic needs for the mobile node. Some of them discussed below:…”
Section: Introductionmentioning
confidence: 99%
“…This network has created with the wireless equipments. The major advantage of this network is-it is infrastructure less, it can be self-deploy and it doesn't need a centralized authority [1].along with that there are many important characteristic needs for the mobile node. Some of them discussed below:…”
Section: Introductionmentioning
confidence: 99%
“…In the first phase the wormhole node will broadcast about the false route. In the second phase the attacker can do whatever they want to with the data passing through this link [2], [3].…”
Section: Wormhole Attackmentioning
confidence: 99%
“…Each mobile node is self sufficient with resources that require communicating within the network. This type of networks are cost effective but has limited bandwidth, speed memory type of resources [1]. Due to mobilization nature of manet; it is prone to many types of attacks.…”
Section: Introductionmentioning
confidence: 99%
“…So the network is prone to different attacks like rushing, blackhole, DDOS, byzantine, wormhole [1].Wormhole attack is security breaching attack. In normal routing data transfer take place by authorized nodes whatever legal path is created in the routing table that path is followed by the source to destination.…”
Section: Introductionmentioning
confidence: 99%