Abstract

hoc network is self-organizing and adaptive. Networks are formed on-the-fly; devices can leave and join the network during its lifetime, devices can be mobile within the network, the network as a whole may be mobile and the network can be deformed on the-fly. In wireless ad hoc networks, nodes depend upon other node to forward packets for each other to communicate beyond their transmission range. Ad-hoc network are very useful in war , accidental , military services, flood , earthquake situations and also in normal conditions..In multihop wireless Ad-hoc networks, cooperation between nodes to route each other's packets exposes these nodes to a wide range of security attacks. Therefore, networks are vulnerable to various attacks launched through compromised nodes because malicious nodes can easily participate in the networks. . One of such type of attack is Wormhole Attack. It is a tunnel based attack in which a pair of nodes forms a tunnel with false identification (1). In wormhole attacks, one malicious node tunnels packets from its location to the other malicious node.. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them. In this paper we have simulated the wormhole attack in wireless Ad-hoc networks & Manet's. And then we evaluated & discussed the impact on the network by comparing the results with secure network without wormhole attack and unsecure network with wormhole attack. In this way, the impact of the wormhole attack on the network performance is analyzed. Impact of wormhole attack on the network is shown using tool Ns-2.34. The implementation is done with the DYMO routing protocol .

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.