PhD Academy
Academy has grown become one of leading research institute in wireless communications and simulations.Our research in wireless communications will help to PhD scholars and MS students to get their doctorate program including paper writing and coding implementation.
PhD academy has come up with our recent research shows that LTE technology can be used in vechicular communication for future intelligent transport systems (ITS) to improve safety and accuracy by commnicate information between vehicles in safety aspects.
What is a Wormhole attack in wireless networks?
A wormhole attack is an attack used to steal any sort of information from wireless networks and make money. Nowadays, most of the security information are transmitted through wireless technologies. So Wormhole attack becomes a very big threat in the current scenario.
Behaviour of Wormhole attack in wireless networks
The main behaviour of the wormhole attack is disturbing the original network in such a way that it cannot be identified. Also, the attacker can even record the information which is transmitted through the network. Here two or more number of harmful nodes are being created and placed between the original nodes of the wireless network by means of dormancy link. The nodes are connected by means of a tunnel. All the original nodes which are available in the tunnel can be controlled by the attacker.
How to detect and mitigate wormhole attack in wireless networks?
There are several methods which can be used to detect the wormhole attack. The following flowchart clearly explains the ways to detect and mitigate the wormhole attack.
Proposed System- detection and mitigation of Wormhole attack in wireless networks :
Intrusion Detection System is used here in order to detect the wormhole attack. This kind of system identifies all the new changes in the network. If any manifestation is found, then it shows that attack is present. If any neighbouring node is out of transmission range, then there is a 100 % chance of attack.
There are two types of modules namely Centralised module and distributed module which are used to identify the wormhole attack.
In the centralised module, distance between nodes is calculated. Then it is validated by checking whether the distance lies within the range of transmission. Finally, the duplicate packets are discarded.
In the distributed module, the information about the neighbours are sent. The packets are also forwarded with the help of other nodes. Several algorithms are followed for detecting and mitigating the attacker.
Experiments:
Experiments are done inorder to identify the attack. By means of the experiment, positive detection rates, energy, packet overhead are calculated accurately. Mostly centralised modules give more effective results. So they are used particularly in large number for protecting the wireless networks.
Wormhole Attack in Wireless Networks reputed Journal paper publication links:
https://www.sciencedirect.com/science/article/abs/pii/S0012369215522915
https://www.journals.elsevier.com/learning-and-motivation/call-for-papers/online-submission-and-review-system
https://www.ijser.org/howtopublishpaper.aspx?gclid=Cj0KCQjw0Mb3BRCaARIsAPSNGpWX1YmX2qmiSMJyzgrMcnhTl5-Bfs4RsYKY3iVLJdv3pNA4-QaZiysaAvDtEALw_wcB
https://www.hindawi.com/
https://www.ijitee.org/call-for-papers/
https://www.ijcna.org/abstract.php?id=36
https://www.mdpi.com/about/announcements/71
https://www.ijrte.org/
http://ijsrem.com/submit-research-paper-online/?gclid=Cj0KCQjw0Mb3BRCaARIsAPSNGpVUPCAVm3THE3v5CwR_4d2ZiVg-XqOxxuDCD9IgHUVb4IoYLZ0k4nIaAt4REALw_wcB
http://www.ijstr.org/online-submission.php