![]() ![]() Most previous works protecting against wormhole attack use methodologies assuming the viewpoint of administrator, trying to identify the wormhole, and then defend against it. Its severity and influence has been analyzed in. ![]() The entire routing system in MANET can even be brought down using the wormhole attack. With this leverage, attackers using wormholes can easily manipulate the routing priority in MANET to perform eavesdropping, packet modification or perform a DoS (Denial of Service) attack, and so on. The resulting route through the wormhole may have a better metric, i.e., a lower hop-count than normal routes. In practice, attackers can use high power antennas or a wired link, or other methods. In a wormhole attack, attackers “tunnel” packets to another area of the network bypassing normal routes as shown in Figure 1. Recently, a novel exploit called wormhole attack was introduced. To the best of our knowledge, most previous research has focused on protocol establishment and its efficiency in MANET, but secure routing is very important, and some secure routing protocols based on DSR and AODV have been proposed in these years. So far, many routing protocols have been proposed for MANET, such as DSDV (Destination Sequence Distance Vector), DSR (Dynamic Source Routing) and AODV (Ad-hoc On-Demand Vector) and so on. Typically, the nodes act as both host and router at the same time, i.e., each node in the network can be independent and based on different hardware, but when communication is needed it serves as a data transmitting router after a route discovery procedure. An ad-hoc network is inherently a self-organized network system without any infrastructure. The mobile ad-hoc network, MANET, is a developing wireless technology that has been discussed in many academic research projects in the last decade. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |