Preview

Wormhole Attack in Wireless Ad-hoc Network

Powerful Essays
Open Document
Open Document
2677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wormhole Attack in Wireless Ad-hoc Network
Computer Science and Engineering Department
Indian Institute Of Technology, Bombay
Mumbai-400076
Wormhole Attack in Wireless Ad-hoc Network
CS 649 : Cryptography and Network Security - I
By :
Group No : 03
Group Members :
1. Jeet Patani : 10305001
2. Ankit Shah : 10305013
3. Dhaval Manvar : 10305021
4. Swapnil Shah
: 10305063
5. Nimit Kalaria : 10305904
Wormhole Attack in Wireless Ad-hoc Network
Group No:3
Abstract
Use of wireless networks grows rapidly now days. Ad-hoc networks are widely used now days. However, due to absence of infrastructures, ad-hoc networks are vulnerable to number of attacks. Securing this ad-hoc network is a major concern.
Here we are going to illustrate a particularly severe attack in wireless ad-hoc network called wormhole attack and present a detailed study of it, its causes, effects it can have and remedies and ways to overcome it.
1
Wormhole Attack in Wireless Ad-hoc Network
1
Group No:3
Introduction
Wormhole attack operates in two phase. In the first phase, malicious nodes(attacker node), called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them.They do so by convincing legitimate nodes that sending data via a path through them causes a benefit to them(may be with respect to time, distance etc.) Now once a route is established through it ,in the second phase,wormhole nodes could exploit the data in variety of ways. It can start dropping packets via it, or modify it or even just view data and get useful information or can even monitor data.In this way it can turn out to be very dangerous.We now examine various ways in which malicious node convinces legitimate path to route packets via it (i.e. launh attack) and later see remedies for it.
2
Wormhole Attack Modes
Wormhole attack can be launched using many ways. Following are some of modes.
• Encapsulation
• Out-of-Band Channel
• High Power Transmission
• Packet Relay
• Protocol Deviations
Now we will see each

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    Like the bus network, no single central computer exists in the ring configuration. Messages are transferred from one computer to the next until they reach their intended destinations. Each computer on the ring topology has a particular address. As the messages pass around the ring, the computers validate the address. If the message is not addressed to it, the node transmits the message to the next computer on the ring.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Sec572 Research Paper

    • 587 Words
    • 3 Pages

    These packets are sent through the network by routers. There are lots of protocols-Ethernet, TCP, or whatever, but they all work basically the same way. Routers look at the address on the packets, and then send them toward their destination. They may not know where the destination is, but they know something about where it should go.…

    • 587 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Communication to run smoothly across the network there are devices that place intermediary roles in networking. These intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts (end devices) to the network and can connect multiple individual networks to form an internetwork.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    Is the computer network node the software uses when the ip address does not match any routes of the routing table.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Audit and organize the data. Understanding your data before cleaning improves the efficiency of your project and reduces the time and cost of data cleaning. Understand the purpose, location, flow, and workflows of your data before you start.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    serve as important clues in sensing invasion or intrusion that can harm a network. Network probes are not actual intrusions, although, they could be potential causes of actual intrusions. Port scans and ping sweeps can lead to an intrusion of companies network system, however, with today’s technological advancements, these activities can be detected and prevented.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    11. The long-distance lines and supporting technology that transport large amounts of data between major network nodes are called a (n)…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Signal Theory

    • 1153 Words
    • 5 Pages

    When data is sent over a network, it can either be through a wired or a wireless technology. The data is sent over a network using electric pulses.…

    • 1153 Words
    • 5 Pages
    Better Essays
  • Good Essays

    exploited by the potential users in order to make valid use of this miracles network…

    • 1037 Words
    • 5 Pages
    Good Essays

Related Topics