Papers by Siddhesh Khanvilkar

In wormhole attack, an attacker node keeps data packets at one location in the network and forwar... more In wormhole attack, an attacker node keeps data packets at one location in the network and forward to another attacker node far away by tunneling, which again broadcast them into the network locally. The proposed technique is an efficient detection and prevention method called Wormhole Attack Prevention and Detection Using Authentication Based Delay per Hop Technique for Wireless Network. Detection of wormhole attack is done using number of hops and delay of each node in different paths available in network. The sender node is capable to identify both types of wormhole attacks. Proposed technique detects the legitimate path and path under the wormhole attack. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator. General Terms Security, Wormhole attack, Authentication, Caeser Cipher, Inband Channel, Out of Band Channel.
Uploads
Papers by Siddhesh Khanvilkar