Preview

Wormhole Attack in Wireless Ad-hoc Network

Powerful Essays
Open Document
Open Document
2677 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wormhole Attack in Wireless Ad-hoc Network
Computer Science and Engineering Department
Indian Institute Of Technology, Bombay
Mumbai-400076
Wormhole Attack in Wireless Ad-hoc Network
CS 649 : Cryptography and Network Security - I
By :
Group No : 03
Group Members :
1. Jeet Patani : 10305001
2. Ankit Shah : 10305013
3. Dhaval Manvar : 10305021
4. Swapnil Shah
: 10305063
5. Nimit Kalaria : 10305904
Wormhole Attack in Wireless Ad-hoc Network
Group No:3
Abstract
Use of wireless networks grows rapidly now days. Ad-hoc networks are widely used now days. However, due to absence of infrastructures, ad-hoc networks are vulnerable to number of attacks. Securing this ad-hoc network is a major concern.
Here we are going to illustrate a particularly severe attack in wireless ad-hoc network called wormhole attack and present a detailed study of it, its causes, effects it can have and remedies and ways to overcome it.
1
Wormhole Attack in Wireless Ad-hoc Network
1
Group No:3
Introduction
Wormhole attack operates in two phase. In the first phase, malicious nodes(attacker node), called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them.They do so by convincing legitimate nodes that sending data via a path through them causes a benefit to them(may be with respect to time, distance etc.) Now once a route is established through it ,in the second phase,wormhole nodes could exploit the data in variety of ways. It can start dropping packets via it, or modify it or even just view data and get useful information or can even monitor data.In this way it can turn out to be very dangerous.We now examine various ways in which malicious node convinces legitimate path to route packets via it (i.e. launh attack) and later see remedies for it.
2
Wormhole Attack Modes
Wormhole attack can be launched using many ways. Following are some of modes.
• Encapsulation
• Out-of-Band Channel
• High Power Transmission
• Packet Relay
• Protocol Deviations
Now we will see each

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 9

    • 1048 Words
    • 5 Pages

    It accepts Layer 3 packets and decides the path by which to forward a frame to a host on a remote network.…

    • 1048 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment

    • 629 Words
    • 3 Pages

    Like the bus network, no single central computer exists in the ring configuration. Messages are transferred from one computer to the next until they reach their intended destinations. Each computer on the ring topology has a particular address. As the messages pass around the ring, the computers validate the address. If the message is not addressed to it, the node transmits the message to the next computer on the ring.…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 4: The message is received by each device on the LAN since it is a broadcast. Each device compare the Target Protocol Address (IPv4 Address of the machine to which the source is trying to communicate) with its own Protocol Address (IPv4 Address). Those who do not match will drop the packet without any action.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab6 7 8 9

    • 425 Words
    • 2 Pages

    Network software uses this when my IP does not match any routes on routing chart.…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    IT321 Final Exam Paper

    • 1235 Words
    • 5 Pages

    40. (T or F) Broadcast routing is used in most networks so that users don’t need to remember other users’ network addresses.…

    • 1235 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Allows a network device to intercept and read each network packet that arrives in its entirety.…

    • 424 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    Communication to run smoothly across the network there are devices that place intermediary roles in networking. These intermediary devices provide connectivity and work behind the scenes to ensure that data flows across the network. These devices connect the individual hosts (end devices) to the network and can connect multiple individual networks to form an internetwork.…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    lab 6

    • 252 Words
    • 2 Pages

    Is the computer network node the software uses when the ip address does not match any routes of the routing table.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Audit and organize the data. Understanding your data before cleaning improves the efficiency of your project and reduces the time and cost of data cleaning. Understand the purpose, location, flow, and workflows of your data before you start.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Signal Theory

    • 1153 Words
    • 5 Pages

    When data is sent over a network, it can either be through a wired or a wireless technology. The data is sent over a network using electric pulses.…

    • 1153 Words
    • 5 Pages
    Better Essays
  • Good Essays

    exploited by the potential users in order to make valid use of this miracles network…

    • 1037 Words
    • 5 Pages
    Good Essays

Related Topics