DocumentCode :
116902
Title :
Normalized Worm-hole Local Intrusion Detection Algorithm(NWLIDA)
Author :
Khan, Ajmal ; Shrivastava, S. ; Richariya, Vineet
Author_Institution :
CSE Dept., LNCT, Bhopal, India
fYear :
2014
fDate :
3-5 Jan. 2014
Firstpage :
1
Lastpage :
6
Abstract :
A Mobile Ad-Hoc Network (MANET) is a arrangement of wireless mobile nodes which forms a temporary network for the communication without the access point, high availability of wireless devices in everyday is a measure factor in the success of infrastructure-less networks. MANET is dealing with both kinds of attacks, active and passive attacks at all the layers of network model. The lack in security measures of their routing protocols is alluring a number of attackers to intrude the network. A particular type of attack; known as Wormhole, which is launched by creation of tunnels and it results in complete disruption of routing paths on MANET. This paper presents a technique NWLID: Normalized Wormhole Local Intrusion detection Algorithm which is the modified version of Local Intrusion Detection Routing Security over mobile adhoc Network which has an intermediate neighbor node discovery mechanism, packet drop calculator, individual node receiving packet estimator followed by isolation technique for the confirmed Wormhole nodes. Result shows the effect of wormhole attack on normal behavior and improvement of performance after the application of proposed scheme. The effectiveness of NWLID algorithm is evaluated using ns2 network simulator.
Keywords :
mobile ad hoc networks; telecommunication security; MANET; NS2 network simulator; NWLIDA; active attacks; individual node receiving packet estimator; intermediate neighbor node discovery mechanism; isolation technique; local intrusion detection routing security; mobile ad-hoc network; normalized wormhole local intrusion detection algorithm; packet drop calculator; passive attacks; wireless devices; wireless mobile nodes; Computers; Grippers; Mobile ad hoc networks; Peer-to-peer computing; Routing; Security; Throughput; Ad-hoc Network; Adjoining Node; Black hole; Isolation; Preclusion Ration; Security; Wormhole Tunnel Detection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communication and Informatics (ICCCI), 2014 International Conference on
Conference_Location :
Coimbatore
Print_ISBN :
978-1-4799-2353-3
Type :
conf
DOI :
10.1109/ICCCI.2014.6921748
Filename :
6921748
Link To Document :
بازگشت