scispace - formally typeset
Proceedings ArticleDOI

Wormhole attacks in wireless adhoc networks and their counter measurements: A survey

Preeti Nagrath, +1 more
- Vol. 6, pp 245-250
TLDR
The modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then the solutions and countermeasures on wormholes are discussed.
Abstract
A Mobile Ad Hoc Network (MANET) is a self-organizing, infrastructure less, multi-hop network. The wireless and distributed nature of MANETs poses a great challenge to system security designers. Ad hoc networks are by nature very open to anyone. Their biggest advantage is also one of their biggest disadvantages: Anyone with the proper hardware and knowledge of the network topology and protocols can connect to the network. This allows potential attackers to infiltrate the network and carry out attacks on its participants with the purpose of stealing or altering information. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. The entire routing system in MANET can even be brought down using the wormhole attack. This paper discusses the modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then discusses the solutions and countermeasures on wormholes.

read more

Citations
More filters
Journal ArticleDOI

Securing the Internet of Things: Challenges, threats and solutions

TL;DR: This paper intends to provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures, and identifies the suitable countermeasures and their limitations, paying special attention to the IoT protocols.
Posted Content

A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks

TL;DR: This paper has attempted to present an overview of the routing protocols, the known routing attacks and the proposed countermeasures to these attacks in various works.
Journal ArticleDOI

Security Vulnerabilities in LPWANs—An Attack Vector Analysis for the IoT Ecosystem

TL;DR: Results have shown that LPWANs communication technologies contain security vulnerabilities that can lead to irreversible harm in critical and non-critical IoT application domains, and the conception and implementation of up-to-date defenses are relevant to protect systems, networks, and data.
Journal ArticleDOI

Analysis of Detection Features for Wormhole Attacks in MANETs

TL;DR: This paper thoroughly analyzes existing techniques to counter wormhole attacks in MANETs on the basis of their limitations as well as features that are vital in detecting wormholes in the network.
Journal ArticleDOI

Vehicle authentication via monolithically certified public key and attributes

TL;DR: This is the first work that proposes to certify both the public key and out-of-band sense-able static attributes to enable mutual authentication of the communicating vehicles to avoid impersonation attacks.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.

Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations

TL;DR: The characteristics of Mobile Ad hoc Networks (MANETs), and their idiosyncrasies with respect to traditional, hardwired packet networks, are described, with an emphasis on routing performance evaluation considerations.
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Related Papers (5)