2013
DOI: 10.3844/jcssp.2013.1626.1637
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Wormhole Security Approaches for Ad-Hoc Networks

Abstract: Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…In the transparent mode, wormhole malicious nodes are not victim network members. Where in participant mode, these nodes are the part of the victim network [16].…”
Section: Wormhole Attack (Wha)mentioning
confidence: 99%
“…In the transparent mode, wormhole malicious nodes are not victim network members. Where in participant mode, these nodes are the part of the victim network [16].…”
Section: Wormhole Attack (Wha)mentioning
confidence: 99%
“…In the transparent mode, wormhole malicious nodes are not victim network members. Where in participant mode, these nodes are the part of the victim network [19]. In this paper, the WHAs have performed under transparent mode as an external adversary which can be shown in Figure1.…”
Section: Wormhole Attack (Wha)mentioning
confidence: 99%
“…The node misbehavior issues such as blackhole, grayhole (Jain et al, 2012) and wormhole attack (Hababeh, 2013) are popular security threads in WSN and MANET and many researchers has proposed their solutions to counter this, but still the issue is unable to prevent completely (Tseng et al, 2011). In this study, our methodology is to discuss how a blackhole node makes use of AODV routing process and yields attack in routing and forwarding packets.…”
Section: Introductionmentioning
confidence: 99%