![]() ![]() Despite the truth of reputation of MANET, these networks are so much revealed to attacks ( Lu, Li, Lam, & Jia, 2009 Ullah & Rehman, 2010). MANET is well known due to the point which these networks are powerful, infrastructure less, and scalable. Oluwatobi Ayodeji Akanbi, in A Study of Black Hole Attack Solutions, 2016 1.2 Problem Background ![]() This attack is potentially very much dangerous and attacker most prefers to choose this one.Įlahe Fazeldehkordi. In other type of wormhole attack that is known as in band wormhole attack ( Mahajan et al., 2008) the attacker builds an overlay tunnel over the existing wireless medium. When the attackers are in this situation the attack is known as out of band wormhole ( Mahajan et al., 2008). When the attacker nodes create a direct link between each other in the network, then the wormhole attacker at one side receives packets and transfers them to the other side of the network. In order to recording the ongoing communication and traffic at one network position and channels them to another position in the network the wormhole attackers create a tunnel ( Shanthi et al., 2009). They publicize their route to other nodes in the network to announce them they have the shortest route for transferring their information. They utilize their location, that is, they have shortest route among the nodes as displayed in Fig. ![]() As we said in wormhole attack, the attackers put themselves in powerful strategic place in the network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |