Alzaidi, Mohammed S., Shukla, Piyush Kumar, Sangeetha, V., Pandagre, Karuna Nidhi, Minchula, Vinodh Kumar, Sharma, Sachin, Khan, Arfat Ahmad, and Prashanth, V.
In order to facilitate communication, wireless networks are built from a collection of nodes that may be either static or dynamic. They are acquiring a lot of popularity in the area of research due to the fact that they are ad hoc in nature, and the number of users of mobile devices is rising day by day. Because of the ease with which these networks may be deployed in challenging and unsupervised rural places, the exchange of information has been a reality since the invention of these networks. Mobile ad hoc networks are simple to set up because of the properties that allow for self-organization and the fact that the medium is wireless. A lack of centralized fixed infrastructure, flexibility to frequent change in topologies, and other features like these are some of the other things that draw people's attention to wireless networks. Wireless networks are vulnerable to a wide range of assaults since their nodes are able to move around and their topologies are constantly changing. In addition, MANET operates in an environment that is both open and dynamic, which leaves it subject to a variety of threats from other types of network assaults. Routing protocols are almost always the target of one form or another of the same general category of attacks. Eavesdropping, causing damage, changing routing information, deleting routing information, manipulating information, advertising phoney routes, and misrouting information are all potential components of these assaults. The circumstances may make it difficult to maintain confidentiality in any communications. There are many different kinds of assaults, and each one may damage wireless networks on a different tier of the communication stack and bring the performance of the network down. Eavesdropping, jamming, traffic analysis and monitoring, denial of service attacks, grey hole attacks, black hole attacks, and wormhole assaults are a few examples of the many sorts of attacks that fall under this category. Ad-hoc networks are more susceptible to security breaches than traditional wired and wireless networks due to the usage of open wireless medium, dynamic topology, and dispersed and cooperative channel sharing. The wormhole attack on dispersed wireless networks is being described here by the person who conducted this study. Because this assault is so potent, it is very difficult to identify it before it has ever been launched. The invader may simply initiate it without having knowledge of the network or compromising any authorized nodes, which is a need for launching it. During a wormhole attack, a malicious node in one part of the network takes control of the packets and tunnels them to another hostile node in a different part of the network, which then repeats the packets locally. The thesis aims to do two things at the same time: (a) To simulate a variety of possible wormhole assaults on the MANET network (b) To investigate the functionality and efficiency of the proposed secure routing protocol within the context of these simulated attacks on the network. [ABSTRACT FROM AUTHOR]