General Information
    • ISSN: 1793-8201 (Print), 2972-4511 (Online)
    • Abbreviated Title: Int. J. Comput. Theory Eng.
    • Frequency: Quarterly
    • DOI: 10.7763/IJCTE
    • Editor-in-Chief: Prof. Mehmet Sahinoglu
    • Associate Editor-in-Chief: Assoc. Prof. Alberto Arteta, Assoc. Prof. Engin Maşazade
    • Managing Editor: Ms. Mia Hu
    • Abstracting/Indexing: Scopus (Since 2022), INSPEC (IET), CNKI,  Google Scholar, EBSCO, etc.
    • Average Days from Submission to Acceptance: 192 days
    • E-mail: ijcte@iacsitp.com
    • Journal Metrics:

Editor-in-chief
Prof. Mehmet Sahinoglu
Computer Science Department, Troy University, USA
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.

IJCTE 2012 Vol.4(2): 229-233 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2012.V4.457

Wormhole Attack in Wireless Ad-Hoc Networks

Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour

Abstract—Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack, attackers create a direct link, referred to as a wormhole tunnel, between them. Wormhole tunnels can be occurring by means of a wired link, a high quality wireless out-of-band link or a logical link via packet encapsulation. After building a wormhole tunnel, one attacker receives and copies packets from its neighbors, and forwards them to the other colluding attacker through the wormhole tunnel. However they need special hardware to support such communication. In this paper, we propose an efficient method to detect, secure and avoid wormhole attacks. We have introduce a special packet with name WADP packet that when a node suspect to a wormhole attack, sends it for his cluster head and to own cluster head too. Each node that receive WADP packet updates his routing table by dropping wormhole route from his table. Finally all nodes on the network receives WADP packet and drops malicious nodes information’s from his routing tables.

Index Terms—Ad-hoc networks, cluster, malicious nodes, wormhole attack.

Y. G. is with the Department of Computer Engineering, Islamic Azad University, Ajabshir Branch, Ajabshir, Iran (e-mail: Yahya_bonab@yahoo.com).
A. H. is with the Department of Computer Engineering, Islamic Azad University, Ajabshir Branch, Ajabshir, Iran (e-mail: a.heidari@ajabshiriau.ac.ir).
J. K. is with the Department of Computer Science, Tabriz University, Tabriz, Iran (e-mail: jaber_karimpour@yahoo.com).

[PDF]

Cite: Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour, "Wormhole Attack in Wireless Ad-Hoc Networks," International Journal of Computer Theory and Engineering vol. 4, no. 2, pp.  229-233, 2012.


Copyright © 2008-2024. International Association of Computer Science and Information Technology. All rights reserved.