Skip to Main Content
Notice of Violation of IEEE Publication Principles
"A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks"
by M. Jain and H. Kandwal
in the Proceedings of the International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. December 2009, pp. 555-558
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Ad Hoc Networks"
by Marianne A.Azer, Sherif M. El-Kassas, Magdy S. El-Soudani
in International Journal of Computer Science and Information Security, Special Issue, May 2009
Wireless communication faces several security risks. An attacker can easily inject bogus packets, impersonating another sender. We refer to this attack as a spoofing attack. An attacker can also easily eavesdrop on communication record packets, and replay the (potentially altered) packets. In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the second phase, wormhole nodes could exploit the data in variety o- f ways. We will introduce the wormhole attack modes and classes, and point to its impact and threat on ad hoc networks. We finally summarize and conclude this paper.
Date of Conference: 28-29 Dec. 2009