Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.

Cite

CITATION STYLE

APA

Mishra, H. K., & Mittal, M. (2020). Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data. In Smart Innovation, Systems and Technologies (Vol. 141, pp. 681–690). Springer. https://doi.org/10.1007/978-981-13-8406-6_64

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free