By Topic

Detection and Prevention of Layer-3 Wormhole Attacks on Boundary State Routing in Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
E. Poornima ; Dept. of Comput. Sci., G.PullaReddy Eng. Coll., Kurnool, India ; C. Shobha Bindu ; S. K. Munwar

Wormhole attacks in networks consist in two malicious nodes tunneling traffic from one end of the network to the other. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. In this paper we present the possible attacks on BSR protocol. These attacks are difficult to be detected. To avoid the attacks on BSR protocol, we propose two schemes namely Reverse Routing Scheme (RRS) and Authentication of Nodes Scheme (ANS). The RRS method uses no methodology for the detection of the malicious nature of the intermediate nodes. ANS method uses cryptographic concepts.

Published in:

Advances in Computer Engineering (ACE), 2010 International Conference on

Date of Conference:

20-21 June 2010