Detection of wormhole attack in mobile ad-hoc networks
An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary a...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English |
出版: |
2013
|
主题: | |
在线阅读: | http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
id |
my-utm-ep.37029 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.370292017-07-17T08:28:19Z Detection of wormhole attack in mobile ad-hoc networks 2013-06 Sanaei, Mojtaba Ghanaatpisheh TK6570 Mobile Communication System An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary application of Mobile Ad-hoc Networks (MANETs) is for military purpose including the tactical operations where security is often the major concern. The different leaks that threaten the security of wireless network contain, selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One of the dangerous attacks in mobile ad hoc network is named as wormhole attack in which two or more destructive nodes record the packets at one point and transmits them by a wired or wireless to another point in the network. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. The using a cryptographic technique is not enough to prevent wormhole attack. So, in this study, a new method is proposed based on modifying the forwarding packet process and also using a delay per hop and expiry time technique to detect wormhole. The performance evaluation of the proposed method is done using a mathematical modeling and simulation. 2013-06 Thesis http://eprints.utm.my/id/eprint/37029/ http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70090?site_name=Restricted Repository masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK6570 Mobile Communication System |
spellingShingle |
TK6570 Mobile Communication System Sanaei, Mojtaba Ghanaatpisheh Detection of wormhole attack in mobile ad-hoc networks |
description |
An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary application of Mobile Ad-hoc Networks (MANETs) is for military purpose including the tactical operations where security is often the major concern. The different leaks that threaten the security of wireless network contain, selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One of the dangerous attacks in mobile ad hoc network is named as wormhole attack in which two or more destructive nodes record the packets at one point and transmits them by a wired or wireless to another point in the network. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. The using a cryptographic technique is not enough to prevent wormhole attack. So, in this study, a new method is proposed based on modifying the forwarding packet process and also using a delay per hop and expiry time technique to detect wormhole. The performance evaluation of the proposed method is done using a mathematical modeling and simulation. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Sanaei, Mojtaba Ghanaatpisheh |
author_facet |
Sanaei, Mojtaba Ghanaatpisheh |
author_sort |
Sanaei, Mojtaba Ghanaatpisheh |
title |
Detection of wormhole attack in mobile ad-hoc networks |
title_short |
Detection of wormhole attack in mobile ad-hoc networks |
title_full |
Detection of wormhole attack in mobile ad-hoc networks |
title_fullStr |
Detection of wormhole attack in mobile ad-hoc networks |
title_full_unstemmed |
Detection of wormhole attack in mobile ad-hoc networks |
title_sort |
detection of wormhole attack in mobile ad-hoc networks |
granting_institution |
Universiti Teknologi Malaysia, Faculty of Computing |
granting_department |
Faculty of Computing |
publishDate |
2013 |
url |
http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf |
_version_ |
1747816493717913600 |