Performance evaluation of wormhole security approaches for ad-hoc networks

Ismail Hababeh, Issa Khalil, Abdallah Khreishah, Samir Bataineh

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.

Original languageEnglish
Pages (from-to)1626-1637
Number of pages12
JournalJournal of Computer Science
Volume9
Issue number12
DOIs
Publication statusPublished - 19 Dec 2013

Fingerprint

Wireless ad hoc networks
Ad hoc networks
Wireless networks
Topology

Keywords

  • Ad-hoc networks
  • Security
  • Wormhole

ASJC Scopus subject areas

  • Software
  • Computer Networks and Communications
  • Artificial Intelligence

Cite this

Performance evaluation of wormhole security approaches for ad-hoc networks. / Hababeh, Ismail; Khalil, Issa; Khreishah, Abdallah; Bataineh, Samir.

In: Journal of Computer Science, Vol. 9, No. 12, 19.12.2013, p. 1626-1637.

Research output: Contribution to journalArticle

Hababeh, Ismail ; Khalil, Issa ; Khreishah, Abdallah ; Bataineh, Samir. / Performance evaluation of wormhole security approaches for ad-hoc networks. In: Journal of Computer Science. 2013 ; Vol. 9, No. 12. pp. 1626-1637.
@article{c1915064a7664fb99af22ebcde1ca034,
title = "Performance evaluation of wormhole security approaches for ad-hoc networks",
abstract = "Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.",
keywords = "Ad-hoc networks, Security, Wormhole",
author = "Ismail Hababeh and Issa Khalil and Abdallah Khreishah and Samir Bataineh",
year = "2013",
month = "12",
day = "19",
doi = "10.3844/jcssp.2013.1626.1637",
language = "English",
volume = "9",
pages = "1626--1637",
journal = "Journal of Computer Science",
issn = "1549-3636",
publisher = "Science Publications",
number = "12",

}

TY - JOUR

T1 - Performance evaluation of wormhole security approaches for ad-hoc networks

AU - Hababeh, Ismail

AU - Khalil, Issa

AU - Khreishah, Abdallah

AU - Bataineh, Samir

PY - 2013/12/19

Y1 - 2013/12/19

N2 - Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.

AB - Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.

KW - Ad-hoc networks

KW - Security

KW - Wormhole

UR - http://www.scopus.com/inward/record.url?scp=84890335331&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84890335331&partnerID=8YFLogxK

U2 - 10.3844/jcssp.2013.1626.1637

DO - 10.3844/jcssp.2013.1626.1637

M3 - Article

AN - SCOPUS:84890335331

VL - 9

SP - 1626

EP - 1637

JO - Journal of Computer Science

JF - Journal of Computer Science

SN - 1549-3636

IS - 12

ER -