@article{(Open Science Index):https://publications.waset.org/pdf/12047, title = {Analysis of Detecting Wormhole Attack in Wireless Networks}, author = {Khin Sandar Win}, country = {}, institution = {}, abstract = {In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network. In which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. The wormhole attack is possible even if the attacker has not compromised any hosts and even if all communication provides authenticity and confidentiality. In this paper, we analyze wormhole attack nature in ad hoc and sensor networks and existing methods of the defending mechanism to detect wormhole attacks without require any specialized hardware. This analysis able to provide in establishing a method to reduce the rate of refresh time and the response time to become more faster.}, journal = {International Journal of Electronics and Communication Engineering}, volume = {2}, number = {12}, year = {2008}, pages = {2704 - 2710}, ee = {https://publications.waset.org/pdf/12047}, url = {https://publications.waset.org/vol/24}, bibsource = {https://publications.waset.org/}, issn = {eISSN: 1307-6892}, publisher = {World Academy of Science, Engineering and Technology}, index = {Open Science Index 24, 2008}, }