In era of wireless device, MANET are becoming more and more common due to current enhancements .There will be no centralized authority to manage the network .MANET is used for tracking and monitoring the attended environment, as nodes are small with limited resources as well as highly mobile .Communication among nodes is accomplished by different routing protocols .But these protocols have different security flaws and attack. Worm hole attack is one of the serious threat in context of Ad Hoc Network, thereforeis typically challenging to defend and frequently occurred in wireless systems. In this paper, impact of Worm Hole Attack and its operation on AODV protocol is analyzed.
Kannhavong, Bounpadith, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour. \"A survey of routing attacks in mobile ad hoc networks.\" Wireless communications, IEEE 14, no. 5 (2007): 85-91.
Haas, Zygmunt J., Pearlman, Marc R., Samar, P.: Intrazone Routing Protocol (IARP), June 2001, IETF Internet Draft, draft-ietf-manet-iarp-01.txt
Shiva Prakash, J. P. Saini, S. C. Gupta,” A review of Energy EfficientRouting Protocols for Mobile Ad Hoc Wireless Networks”InternationalJournal of Computer Information Systems, Volume 1, 2010.
Pearlman, Marc R., Haas, Zygmunt J.: Determining the Optimal Configurationfor the Zone RoutingProtocol, August 1999,IEEE Journal on Selected Areas in Communications, Vol. 17, No. 8
Guoxing Zhan, Weisong Shi, Julia Deng, “Design and Implementation of TARF:A Trust-Aware Routing Framework for WSNs”, IEEE Transactions on dependable and secure computing, pp 1545-5971(2012)
Bhatt, Uma Rathore, Priyanka Jain, and RakshaUpadhyay. \"Enhanced AODV—An energy efficient routing protocol for MANET.\" In Engineering (NUiCONE), 2013 NirmaUniversity International Conference on, pp. 1-4. IEEE, 2013.
Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il Jung, “WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”, In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, 2008, pp. 343-348
S. Capkun, L. Butty´an, and J.-P.Hubaux. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pages 21–32, Oct 2003.
MahaAbdelhaq, Rosilah Hassan, Mahamod Ismail, RaedAlsaqour, DaudIsraf, Detecting Sleep Deprivation Attack over MANET Using a Danger Theory –Based Algorithm, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(3): 534-541 The Society of Digital Information and Wireless Communications, 2011 (ISSN: 2220-9085).
PriyankaGoyal,SahilBatra , Ajit Singh, A Literature Review of SecurityAttack in Mobile Ad-hoc Networks, International Journal of Computer Applications (0975 – 8887) Volume 9– No.12, November 2010.
Rashid HafeezKhokhar, MdAsriNgadi and Satira Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, pp. 18-29, Volume-2 Issue-3
L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks”, 14 Proceedings of the 11th Network and Distributed System Security Symposium, 2003.
Y.-C. Hu, A. Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, Security and Privacy Magazine, IEEE, vol. 2, issue 3, pp. 28-39, May 2004.
S. R. Jathe, and D. M. Dakhane, “Indicators for Detecting Sinkhole Attack in MANET”, International Journal of Emerging Technology and Advanced Engineering, vol. 2, pp. 2250-2459, Jan. 2012
Jawandhiya, Pradip M., et al. \"A survey of mobile ad hoc network attacks.\" International Journal of Engineering Science and Technology 2.9 (2010): 4063-4071.
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. IEEE INFOCOM, Mar 2003.