alexa A Study of Behaviour And Performance Analysis Of Wormh
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

A Study of Behaviour And Performance Analysis Of Wormhole Attack In Mobile Ad-Hoc Networks

Karthik Pai B.H1, Dr.Nagesh H.R2, Dr.Niranjan N.Chiplunkar3 and Sharath Kumar4
  1. Assistant Professor, Department of ISE, NMAMIT, Autonomous Institution under VTU, Nitte, Karnataka, India
  2. Professor and Head, Department of CSE, MITE, Institution under VTU, Moodabidri, Karnataka,India
  3. Principal, NMAMIT, Nitte, Autonomous Institution under VTU, Karnataka, India
  4. II year MTech, Department of ISE, NMAMIT, Autonomous Institution under VTU, Nitte, Karnataka, India
Related article at Pubmed, Scholar Google
 

Abstract

The recent developments in the wireless technology and their wide-spread utilization have made remarkable enhancements in productivity in the corporate and industrial sectors. However, these recent developments have also introduced new security threats. Since the wireless shared medium is completely exposed to outsiders, it is susceptible to attacks that could target any of the OSI layers in the network stack. Wormhole attack is one of the most common DoS attacks in MANET. During the wormhole attack, a malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a different point (where other attacker is located), which replays them locally. In the wormhole attack, malicious nodes do not take part in finding routes, meaning that, legitimate nodes do not know their existence. AODV is an one of the well known on demand reactive routing protocol and it has been chosen for implementation of this attack for mobile ad hoc networks. Due to this malicious behaviour introduced by the malicious nodes all the data packets are not delivered to the destination under attacking scenario.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords