{"title":"Reviewing the impact of wormhole attack in MANET","authors":"Dhruvi Sharma, Rakesh Kumar","doi":"10.1109/ICICCS.2016.7542314","DOIUrl":null,"url":null,"abstract":"Security of different networks has always been a primary concern as its necessary to protect the resources being shared and communication being done among the legitimate users. If we let down our safeguards, an attacker can transform the routing protocol and interrupt the network operations through mechanisms such as packet drops, flooding, data fabrication etc. MANET is a type of network whose dynamic topology, decentralizing governance and other such features are always in favour of many security attacks. This paper presents detail study of wormhole attack, algorithms to detect them that has been proposed so far and also directs the reader toward the areas that can be explored and work upon in future.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICCS.2016.7542314","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Security of different networks has always been a primary concern as its necessary to protect the resources being shared and communication being done among the legitimate users. If we let down our safeguards, an attacker can transform the routing protocol and interrupt the network operations through mechanisms such as packet drops, flooding, data fabrication etc. MANET is a type of network whose dynamic topology, decentralizing governance and other such features are always in favour of many security attacks. This paper presents detail study of wormhole attack, algorithms to detect them that has been proposed so far and also directs the reader toward the areas that can be explored and work upon in future.