Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network


     

   Subscribe/Renew Journal


Wireless Mesh Network is one the most special application network because of its unique characteristics. Attacks are important challenging issue in networking. The Wormhole attack is the one of the most aggressive and unmerciful attack. In wormhole attack, a tunnel is established by two or more malicious nodes and one node captures the packets and tunnels them to another node. This attack is difficult to detect and no one can predict what the wormhole nodes does. In the proposed system, the network has to be considered as in a hierarchical clustered manner, where each communication is possible through cluster heads. A Weighted Clustering Algorithm (WCA) is adopted to select the Cluster Head (CH) and the rearrangement of the network as clusters by advertising of CH to its neighborhood.  The system is then desired to discover the wormhole attack in communication through adopted digital signature for authentication and depurating the malicious nodes which create the wormhole tunnel by CH from its neighbor table list. The CH advertises this information to its neighbors. The proposed scheme also uses the forwarding path method for secure data transmission efficiently and also try to minimize the control overhead.


Keywords

Wireless Mesh Network, Wormhole Attack
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 185

PDF Views: 2




  • Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network

Abstract Views: 185  |  PDF Views: 2

Authors

Abstract


Wireless Mesh Network is one the most special application network because of its unique characteristics. Attacks are important challenging issue in networking. The Wormhole attack is the one of the most aggressive and unmerciful attack. In wormhole attack, a tunnel is established by two or more malicious nodes and one node captures the packets and tunnels them to another node. This attack is difficult to detect and no one can predict what the wormhole nodes does. In the proposed system, the network has to be considered as in a hierarchical clustered manner, where each communication is possible through cluster heads. A Weighted Clustering Algorithm (WCA) is adopted to select the Cluster Head (CH) and the rearrangement of the network as clusters by advertising of CH to its neighborhood.  The system is then desired to discover the wormhole attack in communication through adopted digital signature for authentication and depurating the malicious nodes which create the wormhole tunnel by CH from its neighbor table list. The CH advertises this information to its neighbors. The proposed scheme also uses the forwarding path method for secure data transmission efficiently and also try to minimize the control overhead.


Keywords


Wireless Mesh Network, Wormhole Attack