2011 International Conference on Innovations in Information Technology 2011
DOI: 10.1109/innovations.2011.5893822
|View full text |Cite
|
Sign up to set email alerts
|

WHOP: Wormhole attack detection protocol using hound packet

Abstract: The lack of centralised infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack called Wormmhole attack enables an attacker to record packets at one location in the network, tunnels them to another location, and retransmits them into the network. In this paper, we present a protocol for detecting wormhole attacks without use of any special harware such as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
38
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 56 publications
(38 citation statements)
references
References 9 publications
0
38
0
Order By: Relevance
“…In this attack, an adversary receives packets at one point in the network, tunnels them to another point within the community, and then replays them into the network from that point.This tunnel among adversaries is called wormhole [3].…”
Section: Wormhole Attackmentioning
confidence: 99%
“…In this attack, an adversary receives packets at one point in the network, tunnels them to another point within the community, and then replays them into the network from that point.This tunnel among adversaries is called wormhole [3].…”
Section: Wormhole Attackmentioning
confidence: 99%
“…[10] described a protocol WHOP. WHOP suggests the use of hound packet to promote cooperation among nodes.…”
Section: Related Workmentioning
confidence: 99%
“…That added little bit of data makes wormhole discovery and presents substantial inconsistencies in the system, and can very quickly be detected. Wang and Bhargava [11] add an method where system visualization is used for discovery of wormhole attacks in fixed warning networks. In their method, each warning estimates the exact distance to its neighbours utilising the obtained indicate strength.…”
Section: Specialized Practicesmentioning
confidence: 99%