Title :
Wormhole Attack Avoidance Technique in Mobile Adhoc Networks
Author :
Singh, Yogang ; Khatkar, A. ; Rani, Puja ; Deepika, D. ; Barak, D.D.
Author_Institution :
UIET, MD Univ., Rohtak, India
Abstract :
Security is an essential service for wired and wireless network communication. This work concerned with a particularly sever security attack that affects the ad hoc networks routing protocols, called "wormhole attack". There are many solutions to detect and prevent this attack like packet leashes, cluster base, hop count analysis etc., but none of them is perfect solution. This paper contains a proposal for new technique for wormhole avoidance. Proposed technique has been implemented with NS2 simulator over the DSR protocol. This technique for wormhole avoidance addresses the malicious nodes and avoids the routes having wormhole nodes without affecting the overall performance of the network. The performance metrics used for evaluating network performance are jitter, throughput and end to end delay. The performance of proposed techniques is good.
Keywords :
jitter; mobile ad hoc networks; routing protocols; telecommunication network routing; telecommunication security; telecommunication services; DSR protocol; NS2 simulator; ad hoc networks routing protocols; attack prevention; cluster base; hop count analysis; malicious nodes; mobile ad hoc networks; network performance; packet leashes; performance metrics; security attack; security service; wired network communication; wireless network communication; wormhole attack avoidance technique; Mobile ad hoc networks; Routing; Routing protocols; Security; Wireless communication; DSR; MANET; Network Security; Wormhole;
Conference_Titel :
Advanced Computing and Communication Technologies (ACCT), 2013 Third International Conference on
Conference_Location :
Rohtak
Print_ISBN :
978-1-4673-5965-8
DOI :
10.1109/ACCT.2013.68