2015 Fifth International Conference on Communication Systems and Network Technologies 2015
DOI: 10.1109/csnt.2015.253
|View full text |Cite
|
Sign up to set email alerts
|

Defending against Wormhole Attack in MANET

Abstract: In the generation of wireless communication, MANET has become an undividable and acceptable part for communication for mobile equipments. Therefore, interest in research of MANET has been increasing since last several years. Security is a very challenging issue in MANET as it is without infrastructure and self-governing. Nodes in MANET used for real time applications also make it difficult to devise the resource demanding security protocols because of their limited battery, power, memory and processing capabil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(17 citation statements)
references
References 14 publications
0
17
0
Order By: Relevance
“…The nodes can discard the RREQ and don't forward them if they need been processed those already. and also the RREP can discovered forward tips that could the destination by propagating back to the supply nodes [2,7,8] once the supplynode receives the RREP, it records the most recent sequence range to the requested destination and this method is termed as Forward Path setup [9]. The intermediate nodes that receives another RREP once they'd propagated the previous RREP towards the supply, it then checks and compares the new destination sequence range of the new RREP with the previous RREP.…”
Section: Aodv Protocolmentioning
confidence: 99%
“…The nodes can discard the RREQ and don't forward them if they need been processed those already. and also the RREP can discovered forward tips that could the destination by propagating back to the supply nodes [2,7,8] once the supplynode receives the RREP, it records the most recent sequence range to the requested destination and this method is termed as Forward Path setup [9]. The intermediate nodes that receives another RREP once they'd propagated the previous RREP towards the supply, it then checks and compares the new destination sequence range of the new RREP with the previous RREP.…”
Section: Aodv Protocolmentioning
confidence: 99%
“…To exploit the Worm-hole attack [18] successfully, the attacker must have to wait until the node a and b has a connection or exchange the information as shown in Figure. 6.It introduces a malicious node 'X' which is present within the coverage area of the communicating nodes 'a' and 'b'. Intruder creates a tunnel between the a and b and control the traffic between the nodes 'a' and 'b' without affecting the behaviour of the protocol during routing.…”
Section: Wormhole Attackmentioning
confidence: 99%
“…In [5] Procedures dealing with wormhole attack detection and technique for wormhole detection and prevention are proposed. A proposed process is centered on the Hash based Compression function (HCF) which is surely using any relaxed hash perform to compute a worth of hash subject for RREQ packet.…”
Section: Literature Surveymentioning
confidence: 99%