Reactive Protocols Analysis with Wormhole Attack in Ad-hoc Networks

被引:0
|
作者
Garg, Gaurav [1 ]
Kaushal, Sakshi [1 ]
Sharma, Akashdeep [1 ]
机构
[1] Panjab Univ, UIET, Chandigarh, India
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT | 2014年
关键词
Ad hoc; Wormhole; MANETs;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Ad-hoc Networks are constantly prone to variety of attacks at different layers because of its features. Wormhole attack is one of the severe attacks which can be implemented in five different modes. This attack acts as a curse as well as boon for the network users. This paper presents the analysis of reactive protocols (AODV, DSR, DYMO, ANODR) with wormhole attack in both mobile and non-mobile ad-hoc networks. Simulations are carried out under Qualnet 4.5.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [2] Research on security of routing protocols against wormhole attack in the ad hoc networks
    Hua, Huang Wen
    Hua, H.W. (hwh_xa@126.com), 1600, World Scientific and Engineering Academy and Society, Ag. Ioannou Theologou 17-23, Zographou, Athens, 15773, Greece (12): : 255 - 264
  • [3] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [4] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [5] Extension algorithms for reactive routing protocols on Ad-Hoc networks
    Batlle, Juan
    Rios, Miguel
    RWS: 2009 IEEE RADIO AND WIRELESS SYMPOSIUM, 2009, : 103 - 106
  • [6] An end-to-end detection of wormhole attack in wireless ad-hoc networks
    Wang, Xia
    Wong, Johnny
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 39 - +
  • [7] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [8] Rushing Attack Against Routing Protocols in Mobile Ad-Hoc Networks
    Ghoreishi, Seyed-Mohsen
    Abd Razak, Shukor
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 220 - 224
  • [9] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [10] Performance Analysis of Typical Routing Protocols in Ad-Hoc Networks
    Li, Zhongmin
    Wu, Jingjing
    Li, Jiankun
    Gao, Lu
    PROCEEDINGS OF 2013 2ND INTERNATIONAL CONFERENCE ON MEASUREMENT, INFORMATION AND CONTROL (ICMIC 2013), VOLS 1 & 2, 2013, : 75 - 79