Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data

dc.contributor.authorMishra H.K.
dc.contributor.authorMittal M.
dc.date.accessioned2020-02-18T10:06:32Z
dc.date.accessioned2024-08-14T05:05:53Z
dc.date.available2020-02-18T10:06:32Z
dc.date.available2024-08-14T05:05:53Z
dc.date.issued2020
dc.description.abstractWireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.en_US
dc.identifier.doi10.1007/978-981-13-8406-6_64
dc.identifier.isbn9.79E+12
dc.identifier.issn21903018
dc.identifier.urihttps://kr.cup.edu.in/handle/32116/2608
dc.language.isoen_USen_US
dc.publisherSpringeren_US
dc.subjectAd hoc networksen_US
dc.subjectAd hoc on-demand distance vector routing (AODV)en_US
dc.subjectDynamic source routing (DSR)en_US
dc.subjectNetwork simulatoren_US
dc.subjectRouting protocolsen_US
dc.subjectWormhole attacken_US
dc.titleAnalysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Dataen_US
dc.title.journalSmart Innovation, Systems and Technologiesen_US
dc.typeConference Paperen_US
dc.type.accesstypeClose Accessen_US

Files