The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. It is peer to peer network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it to another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with comparison of different wormhole detection techniques in adhoc wireless network.
Abstract-Communication channels are one of the important components of the wireless mobile ad hoc network. The link connectivity among mobile nodes moving in these channels can be measured through various performance metrics. This paper analysis the link connectivity of mobile nodes in one of the well known channel model, the Ricean fading channel, in which a strong dominant signal component is always present among several multipath signals received by receiver. Two performance matrices have been used to evaluate the link analysis of nodes. These are Link duration and Link ratio. It is discovered that the link duration is dependent on Ricean Factor K where as Link ratio shows irregular results, which represent true picture of link connectivity in the presence of fading.Index Terms-Mobile ad hoc networks, ricean fading, ricean factor k, mobility model, link duration, link ratio.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.