A comprehensive review on wormhole attacks in MANET

As MANETs use wireless medium for communication, these are vulnerable to many security attacks. In this paper a comprehensive review is done on the very recent state of the art research results on wormhole attacks and relevant mitigation measures. 100% of the works reviewed here are published in last five years, out of which 80% are published in last three years. The simulation results in NS2 helps to quantify the comparative performances of the different solutions proposed.

[1]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[2]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[3]  Kamanashis Biswas,et al.  Security Threats in Mobile Ad Hoc Network , 2007 .

[4]  Chi-Sung Laih,et al.  A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.

[5]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[6]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  John S. Baras,et al.  Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[8]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.

[9]  Satria Mandala,et al.  A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .

[10]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[11]  Neeraj Mittal,et al.  WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks , 2008, WASA.

[12]  Khin Sandar Win,et al.  Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .

[13]  Djamel Djenouri,et al.  On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.

[14]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[15]  Jaber Karimpour,et al.  Wormhole Attack in Wireless Ad-Hoc Networks , 2012 .

[16]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.