SlideShare a Scribd company logo
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Abstract:
Network coding has been shown to be an effective approach to improve the
wireless system performance. However, many security issues impede its wide
deployment in practice. Besides the well-studied pollution attacks, there is another
severe threat, that of wormhole attacks, which undermines the performance gain of
network coding. Since the underlying characteristics of network coding systems
are distinctly different from traditional wireless networks, the impact of wormhole
attacks and countermeasures are generally unknown. In this paper, we quantify
wormholes’ devastating harmful impact on network coding system performance
through experiments. We first propose a centralized algorithm to detect wormholes
and show its correctness rigorously. For the distributed wireless network, we
proposes DAWN, Distributed detection Algorithm against Wormhole in wireless
Network coding systems, by exploring the change of the flow directions of the
innovative packets caused by wormholes. We rigorously prove that DAWN
guarantees a good lower bound of successful detection rate. We perform analysis
on the resistance of DAWN against collusion attacks.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Introduction:
In wireless network coding systems, the forwarders are allowed to apply
encoding schemes on what they receive, and thus they create and transmit new
packets. The idea of mixing packets on each node takes good advantages of the
opportunity diversity and broadcast nature of wireless communications, and
significantly enhances system performance.
Wireless network coding systems face new challenges and attacks, whose
impact and countermeasures are still not well understood because their underlying
characteristics are different from well-studied traditional wireless networks.
The wormhole attack is one of these attacks. In a wormhole attack, the
attacker can forward each packet using wormhole links and without modifies the
packet transmission by routing it to an unauthorized remote node. Hence, receiving
the rebroadcast packets by the attackers, some nodes will have the illusion that
they are close to the attacker.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Existing System:
Wireless network coding systems the routing and packet forwarding
procedures are different from those in traditional wireless networks wormhole
attacks severely imperil network coding protocols. In particular, if wormhole
attacks are launched in routing, the nodes close to attackers will receive more
packets than they should and be considered as having a good capability in help
forwarding packets. Thus they will be assigned with more responsibility in packet
forwarding than what they can actually provide. Furthermore, other nodes will be
correspondingly contributing less. This unfair distribution of workload will result
in inefficient resource utilization and reduce system performance. Wormhole
attacks launched during the data transmission phase can also be very harmful.
First, wormhole attacks can be used as the first step towards more sophisticated
attacks, such as man-in-the-middle attacks and entropy attacks.
Disadvantages:
 Wormhole attacks launched during the data transmission phase can also be
very harmful.
 Retransmitting the packets from the wormhole links, some victim nodes will
have to process much more non-innovative packets that will waste their
resources; these constitute entropy attacks.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Proposed System:
A wireless network design with a set of homogeneous nodes running
through network coding protocols, Nodes are connected via lossy wireless links.
In wormhole attacks, the attackers between distant locations transmit packets
using an out-of-band tunnel. The transmission tunnel is called a wormhole link.
The packet loss rate on the wormhole link is negligible. The kinds of the wormhole
links can be various, such as an Ethernet cable, an optical link, or a secured long-
range wireless transmission.
In the wireless network systems, we consider that public key infrastructure
(PKI) is in place to implement the public key cryptographic techniques. For the
wireless network, we regard each node1 as a user who has a pair of public and
private keys. The identity and the public key of each user are managed by the
certificate authority (CA), which is a trusted entity. If any node A wants to safely
communicate with node B, A has to request B’s public key from the CA first. After
the transmission, node B has to request A’s public key from the CA in order to
verify the message from A. CA is also responsible to pre distribute and revoke the
key pairs of the nodes. The nodes and the CA together form the PKI, which can
guarantee that no node can forge reports from other nodes.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone-
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
Advantages:
 System will perform rigorous analysis on the detection rate of our algorithm
and its resistance against collusions.
 RLNC has extensive applications in wireless network field as it improves the
throughput and utilization of the information capacity greatly.

More Related Content

What's hot (20)

PDF
B43011014
IJERA Editor
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
I1802046780
IOSR Journals
 
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
PDF
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
 
PDF
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
IJCNCJournal
 
PPTX
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
PPT
Wireless sensor networks
nagibtech
 
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
ambitlick
 
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
DOC
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
PDF
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
PDF
AODV protocol and Black Hole attack
Raj Sikarwar
 
PPTX
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
PDF
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
PDF
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
paperpublications3
 
PDF
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
PDF
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
PDF
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 
B43011014
IJERA Editor
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
I1802046780
IOSR Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
ijsrd.com
 
Performance Evaluation of Wormhole Attack In AODV
IJERA Editor
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
IJCNCJournal
 
NetSim Webinar on Network Attacks and Detection
DESHPANDE M
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Prakash Kumar
 
Wireless sensor networks
nagibtech
 
Detection and prevention of wormhole attack in mobile adhoc networks
ambitlick
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
AODV protocol and Black Hole attack
Raj Sikarwar
 
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
IJNSA Journal
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
paperpublications3
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
IJSRD
 

Viewers also liked (14)

PDF
Ahmad Reza Khawar - Mid-term DI
Reza Khawar
 
PPTX
RecargaYA
Pablo Sg25
 
PDF
Synchro Project Presentation_Rt 322
Mark Politi
 
PDF
Flyer Mindfulness
Emily Howard
 
DOCX
Mu0015 compensation and benefits
consult4solutions
 
PDF
Wissen Products catalouge
Ankur Bhugra
 
DOCX
Pm0016 project risk management
consult4solutions
 
PDF
MT_CV&Port_jun2016
Matteo Tibaldo
 
DOCX
Om0011 enterprises resource planning
consult4solutions
 
PPTX
Cf bclic
Pacolg85
 
PPTX
Trabajo Practico Instituciones
Alex Elia
 
PDF
Wessex AHSN stakeholder survey - full report
Health Innovation Wessex
 
PPTX
Twinspace for Young Tourism
Youngtourismtr
 
DOCX
ijazahmadCv
ijaz ahmad
 
Ahmad Reza Khawar - Mid-term DI
Reza Khawar
 
RecargaYA
Pablo Sg25
 
Synchro Project Presentation_Rt 322
Mark Politi
 
Flyer Mindfulness
Emily Howard
 
Mu0015 compensation and benefits
consult4solutions
 
Wissen Products catalouge
Ankur Bhugra
 
Pm0016 project risk management
consult4solutions
 
MT_CV&Port_jun2016
Matteo Tibaldo
 
Om0011 enterprises resource planning
consult4solutions
 
Cf bclic
Pacolg85
 
Trabajo Practico Instituciones
Alex Elia
 
Wessex AHSN stakeholder survey - full report
Health Innovation Wessex
 
Twinspace for Young Tourism
Youngtourismtr
 
ijazahmadCv
ijaz ahmad
 
Ad

Similar to Wormhole attack detection algorithms (20)

PDF
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
kitechsolutions
 
PDF
Identity based encryption
kitechsolutions
 
PDF
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
kitechsolutions
 
PDF
BDCAM: big data for context-aware Monitoring
kitechsolutions
 
PDF
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
kitechsolutions
 
PDF
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
kitechsolutions
 
PDF
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
kitechsolutions
 
PDF
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
DOCX
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
PDF
MohamedMustafa
Mohamed Mustafa
 
DOCX
Kariem ali mohamed
Kariem Ali
 
PDF
Abdelrahman_Elskhawy
Abdelrahman Elskhawy
 
PDF
Abdelrahman_Elskhawy
Abdelrahman Elskhawy
 
DOC
Origin proposal for on campus training
CETPA Infotech Pvt. ltd.
 
PPT
N C C T Embedded Projects Intro & Presentation
ncct
 
PDF
Updated CV
NarayanlalMenariya
 
PDF
Curriculum Vitae
NarayanlalMenariya
 
DOCX
About company
Deepak Dalal
 
PDF
Ahmed Maged Resume
ahmed maged
 
DOC
Amit Dixit Resume 1
amit dixit
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
kitechsolutions
 
Identity based encryption
kitechsolutions
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
kitechsolutions
 
BDCAM: big data for context-aware Monitoring
kitechsolutions
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
kitechsolutions
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
kitechsolutions
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
kitechsolutions
 
Privacy preserving public auditing for regenerating code based cloud storage
kitechsolutions
 
Assurance of security and privacy requirements for cloud deployment model
Finalyearprojects Toall
 
MohamedMustafa
Mohamed Mustafa
 
Kariem ali mohamed
Kariem Ali
 
Abdelrahman_Elskhawy
Abdelrahman Elskhawy
 
Abdelrahman_Elskhawy
Abdelrahman Elskhawy
 
Origin proposal for on campus training
CETPA Infotech Pvt. ltd.
 
N C C T Embedded Projects Intro & Presentation
ncct
 
Updated CV
NarayanlalMenariya
 
Curriculum Vitae
NarayanlalMenariya
 
About company
Deepak Dalal
 
Ahmed Maged Resume
ahmed maged
 
Amit Dixit Resume 1
amit dixit
 
Ad

Recently uploaded (20)

PPTX
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
PPTX
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
PPTX
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
PPTX
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
PPT
digestive system for Pharm d I year HAP
rekhapositivity
 
PDF
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
PPTX
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
PDF
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 
PPTX
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
PPTX
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
PDF
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
PDF
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PPTX
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
PPTX
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
PPTX
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
PDF
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
PPTX
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 
Optimizing Cancer Screening With MCED Technologies: From Science to Practical...
i3 Health
 
Nutri-QUIZ-Bee-Elementary.pptx...................
ferdinandsanbuenaven
 
A PPT on Alfred Lord Tennyson's Ulysses.
Beena E S
 
How to Configure Access Rights of Manufacturing Orders in Odoo 18 Manufacturing
Celine George
 
digestive system for Pharm d I year HAP
rekhapositivity
 
BÀI TẬP BỔ TRỢ THEO LESSON TIẾNG ANH - I-LEARN SMART WORLD 7 - CẢ NĂM - CÓ ĐÁ...
Nguyen Thanh Tu Collection
 
Gall bladder, Small intestine and Large intestine.pptx
rekhapositivity
 
The-Beginnings-of-Indian-Civilisation.pdf/6th class new ncert social/by k san...
Sandeep Swamy
 
How to Configure Storno Accounting in Odoo 18 Accounting
Celine George
 
Views on Education of Indian Thinkers J.Krishnamurthy..pptx
ShrutiMahanta1
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
How to Manage Access Rights & User Types in Odoo 18
Celine George
 
Zoology (Animal Physiology) practical Manual
raviralanaresh2
 
IMP NAAC REFORMS 2024 - 10 Attributes.pdf
BHARTIWADEKAR
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
How to Create Rental Orders in Odoo 18 Rental
Celine George
 
Pyhton with Mysql to perform CRUD operations.pptx
Ramakrishna Reddy Bijjam
 
2025 Winter SWAYAM NPTEL & A Student.pptx
Utsav Yagnik
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 - GLOBAL SUCCESS - CẢ NĂM - NĂM 2024 (VOCABULARY, ...
Nguyen Thanh Tu Collection
 
How to Configure Lost Reasons in Odoo 18 CRM
Celine George
 

Wormhole attack detection algorithms

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: [email protected] Abstract: Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes’ devastating harmful impact on network coding system performance through experiments. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. For the distributed wireless network, we proposes DAWN, Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks.
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: [email protected] Introduction: In wireless network coding systems, the forwarders are allowed to apply encoding schemes on what they receive, and thus they create and transmit new packets. The idea of mixing packets on each node takes good advantages of the opportunity diversity and broadcast nature of wireless communications, and significantly enhances system performance. Wireless network coding systems face new challenges and attacks, whose impact and countermeasures are still not well understood because their underlying characteristics are different from well-studied traditional wireless networks. The wormhole attack is one of these attacks. In a wormhole attack, the attacker can forward each packet using wormhole links and without modifies the packet transmission by routing it to an unauthorized remote node. Hence, receiving the rebroadcast packets by the attackers, some nodes will have the illusion that they are close to the attacker.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: [email protected] Existing System: Wireless network coding systems the routing and packet forwarding procedures are different from those in traditional wireless networks wormhole attacks severely imperil network coding protocols. In particular, if wormhole attacks are launched in routing, the nodes close to attackers will receive more packets than they should and be considered as having a good capability in help forwarding packets. Thus they will be assigned with more responsibility in packet forwarding than what they can actually provide. Furthermore, other nodes will be correspondingly contributing less. This unfair distribution of workload will result in inefficient resource utilization and reduce system performance. Wormhole attacks launched during the data transmission phase can also be very harmful. First, wormhole attacks can be used as the first step towards more sophisticated attacks, such as man-in-the-middle attacks and entropy attacks. Disadvantages:  Wormhole attacks launched during the data transmission phase can also be very harmful.  Retransmitting the packets from the wormhole links, some victim nodes will have to process much more non-innovative packets that will waste their resources; these constitute entropy attacks.
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: [email protected] Proposed System: A wireless network design with a set of homogeneous nodes running through network coding protocols, Nodes are connected via lossy wireless links. In wormhole attacks, the attackers between distant locations transmit packets using an out-of-band tunnel. The transmission tunnel is called a wormhole link. The packet loss rate on the wormhole link is negligible. The kinds of the wormhole links can be various, such as an Ethernet cable, an optical link, or a secured long- range wireless transmission. In the wireless network systems, we consider that public key infrastructure (PKI) is in place to implement the public key cryptographic techniques. For the wireless network, we regard each node1 as a user who has a pair of public and private keys. The identity and the public key of each user are managed by the certificate authority (CA), which is a trusted entity. If any node A wants to safely communicate with node B, A has to request B’s public key from the CA first. After the transmission, node B has to request A’s public key from the CA in order to verify the message from A. CA is also responsible to pre distribute and revoke the key pairs of the nodes. The nodes and the CA together form the PKI, which can guarantee that no node can forge reports from other nodes.
  • 5. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone- from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: [email protected] Advantages:  System will perform rigorous analysis on the detection rate of our algorithm and its resistance against collusions.  RLNC has extensive applications in wireless network field as it improves the throughput and utilization of the information capacity greatly.