Author_Institution :
Dept. Of Inf. Technol., Guru Gobind Singh Indraprastha Univ., New Delhi, India
Abstract :
Notice of Violation of IEEE Publication Principles
"A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks"
by M. Jain and H. Kandwal
in the Proceedings of the International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT \´09. December 2009, pp. 555-558
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the paper cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following article:
"A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Ad Hoc Networks"
by Marianne A.Azer, Sherif M. El-Kassas, Magdy S. El-Soudani
in International Journal of Computer Science and Information Security, Special Issue, May 2009
Wireless communication faces several security risks. An attacker can easily inject bogus packets, impersonating another sender. We refer to this attack as a spoofing attack. An attacker can also easily eavesdrop on communication record packets, and replay the (potentially altered) packets. In this paper, we are concerned of a particularly severe security attack that affects the ad hoc networks routing protocols, it is called the wormhole attack. We can think of wormhole attack as a two phase process launched by one or several malicious nodes. In the first phase, these malicious nodes, called wormhole nodes, try to lure legitimate nodes to send data to other nodes via them. In the second phase, wormhole nodes could exploit the data in variety o- f ways. We will introduce the wormhole attack modes and classes, and point to its impact and threat on ad hoc networks. We finally summarize and conclude this paper.
Keywords :
ad hoc networks; routing protocols; telecommunication security; communication record packets; routing protocols; wireless ad hoc networks; wireless communication security; wormhole attack; Ad hoc networks; Communication system control; Communication system security; Computer networks; Encapsulation; Information technology; Mobile ad hoc networks; Telecommunication computing; Telecommunication control; Wireless communication; Complex wormhole; Wireless ad hoc network; attack modes and classes; wormhole nodes;
Conference_Titel :
Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. International Conference on