17-02-2017, 09:38 AM
Wormhole attacks, attackers tunnel packets between distant locations on the network through an in or out-of-band channel. Wormhole can attract and avoid a lot of network traffic, and therefore the attacker can collect and manipulate network traffic. The wormhole tunnel gives two distant nodes the illusion that they are close to each other.Wormhole Attack-Wormhole is a type of DoS attack. In this Attack Type An attacker gets the packet from the source or Neighbor node and transfer it to another malicious node Node (another attacker). The attack of a wormhole is a tunnel Attack in which 2 or more concomitant nodes participate. One Malicious node sends packet path to another malicious node Through a secret channel. Various types of malicious The activities are carried out in this secret channel like sniffing, Dropping, selective dropping of data packets, etc. In the wormhole the malicious node m1 first captures the routing Message from the neighbor or source node and propagates Message to another malicious node, for example m2, by means of a Secret path.m2 then sends this message to the desired address. destination.
Security Approaches to Attacking a Wormhole:
• Authentication.
• Certificates of identity.
• Authorization.
Effects of the wormhole attack:
• Change the network topology.
• Change the flow of normal messages.
• False / forged routing information.
• Destruction / alteration of packets by worm nodes.
Security Approaches to Attacking a Wormhole:
• Authentication.
• Certificates of identity.
• Authorization.
Effects of the wormhole attack:
• Change the network topology.
• Change the flow of normal messages.
• False / forged routing information.
• Destruction / alteration of packets by worm nodes.