Impact Study and Analysis of Hidden-mode of Wormhole Attack in Opportunistic Mobile Networks

S Aslam, A Altaweel, I Kamel - 2023 15th International …, 2023 - ieeexplore.ieee.org
The hidden-mode of wormhole attack is launched by malicious nodes that compromise
different locations in Opportunistic Mobile Networks (OMNs). These locations, which are …

Exposed-mode of wormhole attack in opportunistic mobile networks: Impact study and analysis

S Aslam, A Altaweel, I Kamel - Proceedings of the 2023 European …, 2023 - dl.acm.org
Wormhole attack has exposed-mode (internal attack with exposed attacker nodes identities)
and hidden-mode (external attack with hidden attacker nodes identities). In exposed-mode …

JamholeHunter: On detecting new wormhole attack in Opportunistic Mobile Networks

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2024 - Elsevier
This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing
protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In …

Security analysis of opportunistic networks using complex network properties

S Mohan, G Qu, F Mili - … 7th International Conference, WASA 2012, Yellow …, 2012 - Springer
Abstract An Opportunistic Network (Oppnet) is an enhanced evolution of Mobile ad hoc
network, where at any given time a route between source and destination does not exist, yet …

Security attacks in opportunistic mobile networks: A systematic literature review

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2023 - Elsevier
Abstract Opportunistic Mobile Networks (OMNs), also known as Delay Tolerant Networks
(DTNs), refer to wireless networks in which the mobile nodes (eg, smartphones, tablets …

Misrouted Prophecy–On the Impact of Security Attacks on PRoPHET

R Bialon, K Graffi - Euro-Par 2016: Parallel Processing Workshops: Euro …, 2017 - Springer
In opportunistic networking, the wireless connectivity of mobile nodes is used to engage in
opportunistic contacts, to exchange messages and thus to forward message in a store-carry …

On detecting route hijacking attack in opportunistic mobile networks

A Altaweel, R Stoleru, G Gu, AK Maity… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile
Networks (OMNs) are vulnerable to the CollusiveHijack attack, in which a malicious attacker …

Detection and Mitigation of Blackhole Attack Effect in Opportunistic Networks

S Barai, P Bhaumik - 2021 19th OITS International Conference …, 2021 - ieeexplore.ieee.org
Blackhole attack is one of the major security concerns in mobile ad-hoc networks that are
hard to detect. In this type of attack, the malicious node attracts message packets by …

BMWA: A Novel Model for Behavior Mapping for Wormhole Adversary Node in MANET

SB Geetha, VC Patil - … Proceedings of 2nd International Conference, ICICC …, 2018 - Springer
Wormhole attack has received very less attention in the research community with respect to
mobile ad hoc network (MANET). Majority of the security techniques are toward different …

[PDF][PDF] Securing on demand source routing protocol in mobile Ad-Hoc networks by wormhole attacks

P Butle, R Dev, A Dalvi, M Dautpure - Int Res J Eng Technol (IRJET), 2018 - academia.edu
A mobile ad hoc network (MANET), is a kind of wireless network which is infrastructure-less
and adaptive in nature. MANET follows multicast communication as many applications in …