Future of Information and Communication Conference (FICC) 2023
2-3 March 2023
Publication Links
IJACSA
Special Issues
Future of Information and Communication Conference (FICC)
Computing Conference
Intelligent Systems Conference (IntelliSys)
Future Technologies Conference (FTC)
Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2018.090463
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 9 Issue 4, 2018.
Abstract: Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.
David Samuel Bhatti, Kinza Sardar, Meh Jabeen and Umair B. Chaudhry, “Combating the Looping Behavior: A Result of Routing Layer Attack” International Journal of Advanced Computer Science and Applications(IJACSA), 9(4), 2018. http://dx.doi.org/10.14569/IJACSA.2018.090463
@article{Bhatti2018,
title = {Combating the Looping Behavior: A Result of Routing Layer Attack},
journal = {International Journal of Advanced Computer Science and Applications},
doi = {10.14569/IJACSA.2018.090463},
url = {http://dx.doi.org/10.14569/IJACSA.2018.090463},
year = {2018},
publisher = {The Science and Information Organization},
volume = {9},
number = {4},
author = {David Samuel Bhatti and Kinza Sardar and Meh Jabeen and Umair B. Chaudhry}
}