@article {10.3844/jcssp.2013.1626.1637, article_type = {journal}, title = {PERFORMANCE EVALUATION OF WORMHOLE SECURITY APPROACHES FOR AD-HOC NETWORKS}, author = {Hababeh, Ismail and Khalil, Issa and Khreishah, Abdallah and Bataineh, Samir}, volume = {9}, number = {12}, year = {2013}, month = {Nov}, pages = {1626-1637}, doi = {10.3844/jcssp.2013.1626.1637}, url = {https://thescipub.com/abstract/jcssp.2013.1626.1637}, abstract = {Ad-hoc networks are talented but are exposed to the risk of wormhole attacks. However, a wormhole attack can be mounted easily and forms stern menaces in networks, particularly against various ad-hoc wireless networks. The Wormhole attack distorts the network topology and decrease the network systems performance. Therefore, identifying the possibility of wormhole attacks and recognizing techniques to defend them are central to the security of wireless networks as a whole. In this study, we will summarize state of the art wormhole defense approaches, categories most of the existing typical approaches and discuss both the advantages and disadvantages of these methods. We will also point out some unfulfilled areas in the wormhole problem and provide some directions for future exploring.}, journal = {Journal of Computer Science}, publisher = {Science Publications} }