Essay Examples on San Juan College

Two or more collaborating malicious nodes can Establish

Two or more collaborating malicious nodes can establish this attack by constructing a low latency tunnel and transmitting the captured packet again to various parts of the network The architecture of the wireless network is such that it has exposes itself to these malicious nodes these nodes capture the packets which are not addressed to these them and transmits the packet back to the other collaborating malicious partner present at the other end of the tunnel giving an illusion of these nodes being physically very close to each other This attacks creates a disturbance in the routing for the nodes get an notion that the link consists of one or two hops shorter as compared to multiple hops which may also lead to flooding and packet dropping These attacks are therefore very dangerous and also are difficult to detect as the wormhole tunnels are private and out of bound in nature hence won t be visible to the network The Wormhole and black hole attacks create an idea of rendering the shortest path which results in the entire traffic coming through to this route which can also result in Denial of service attack The wormhole attack can be classified into the following categories Open Wormhole attack Closed Wormhole Attack Half open wormhole attack Open wormhole In this kind of attack the malicious nodes alter the RREQ packet by including themselves in header of the RREQ packet following the route discovery procedure 



2 pages | 482 words
Save