2022
DOI: 10.1515/comp-2022-0245
|View full text |Cite
|
Sign up to set email alerts
|

Wormhole attack detection techniques in ad-hoc network: A systematic review

Abstract: Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 171 publications
0
3
0
Order By: Relevance
“…The performance of these protocols varies based on parameters like packet loss and energy consumption [7]. The MP-OLSR hybrid protocol demonstrated higher performance than AODV and DSR in specific contexts, but its efficacy might vary with different network configurations and mobility patterns [8]. AODV showcased better performance under high mobility scenarios, proving advantageous for real-time applications compared to DSR [9].…”
Section: Literature Surveymentioning
confidence: 99%
“…The performance of these protocols varies based on parameters like packet loss and energy consumption [7]. The MP-OLSR hybrid protocol demonstrated higher performance than AODV and DSR in specific contexts, but its efficacy might vary with different network configurations and mobility patterns [8]. AODV showcased better performance under high mobility scenarios, proving advantageous for real-time applications compared to DSR [9].…”
Section: Literature Surveymentioning
confidence: 99%
“…Wireless sensor systems (WSNs) have encountered breathtaking development in recent years due to decreasing costs and a wide range of applications. In a WSN, a large number of sensor nodes are installed for gathering information from a monitored environment and transmitting it using the wireless medium to the base station [1]. Despite their advantages, WSNs face unique challenges such as limited storage, energy constraints, and high node density, which distinguish them from other wireless networks [2].…”
Section: Introductionmentioning
confidence: 99%
“…As a result, the node that is actually transferring the data packets to the recipient node wastes energy. In participation mode, the malicious node is visible to all nodes and the worm-hole attack is conducted through hidden mode 7 , during which authenticated nodes are unaware of the malicious nodes, and its activity is categorised as both an in-band attack and an out-of-band attack 8 . While the out-of-band approach will build an additional tunnel without degrading the nearby nodes, an in-band attack will tunnel through neighbouring nodes, which will reduce the energy consumption of legitimate nodes and malevolent nodes 9 .…”
Section: Introductionmentioning
confidence: 99%