International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 127

Review Papers | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016


A Review on Effective Algorithm to Secure Network Coding Systems against Wormhole Attack

Amruta Zanwar | Smita Ponde [2]


Abstract: In wireless systems, network coding has demonstrated a powerful approach in expanding system performance. Beside this if we consider the practical scenario, there are numerous security concerns which hinder its wide sending. Other than the very much contemplated pollution attacks, there is another serious risk of wormhole attacks. This attack collapses the execution increase of network coding. As the qualities of network coding are particularly not quite the same as traditional wireless networks. Subsequently the effect of these attacks and countermeasures are obscure. In this paper we analyzed the various techniques to detect as well as prevent wormhole attack and comparison between them. Consequently, we will take a review on centralized algorithm to find wormhole in the network.


Keywords: Wormhole attack, RLNC-Random Linear Network Coding, Traditional wireless system, Wormhole detection techniques


Edition: Volume 5 Issue 3, March 2016,


Pages: 808 - 811


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Amruta Zanwar, Smita Ponde, "A Review on Effective Algorithm to Secure Network Coding Systems against Wormhole Attack", International Journal of Science and Research (IJSR), Volume 5 Issue 3, March 2016, pp. 808-811, https://www.ijsr.net/get_abstract.php?paper_id=NOV161983

Similar Articles with Keyword 'Wormhole attack'

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana | Sandeep Gupta [3]

Share this Article

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1823 - 1826

Impact and Performance Analysis of WORMHOLE Attack on AODV in MANET using NS2

Manju Ojha | Dr. Rajendra Singh Kushwah

Share this Article
Top