CFP last date
20 May 2024
Reseach Article

An Efficient Algorithm based on Fibonacci pattern Hound packets for Detection of Wormhole Attack in DSR for Mobile Ad Hoc Networks

by Krishna Kumar Joshi, Neelam Khemariya, Deepak Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 11
Year of Publication: 2013
Authors: Krishna Kumar Joshi, Neelam Khemariya, Deepak Chaudhary
10.5120/10511-5475

Krishna Kumar Joshi, Neelam Khemariya, Deepak Chaudhary . An Efficient Algorithm based on Fibonacci pattern Hound packets for Detection of Wormhole Attack in DSR for Mobile Ad Hoc Networks. International Journal of Computer Applications. 63, 11 ( February 2013), 23-28. DOI=10.5120/10511-5475

@article{ 10.5120/10511-5475,
author = { Krishna Kumar Joshi, Neelam Khemariya, Deepak Chaudhary },
title = { An Efficient Algorithm based on Fibonacci pattern Hound packets for Detection of Wormhole Attack in DSR for Mobile Ad Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 11 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number11/10511-5475/ },
doi = { 10.5120/10511-5475 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:03.664340+05:30
%A Krishna Kumar Joshi
%A Neelam Khemariya
%A Deepak Chaudhary
%T An Efficient Algorithm based on Fibonacci pattern Hound packets for Detection of Wormhole Attack in DSR for Mobile Ad Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 11
%P 23-28
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks are playing very important role in the present world. Mobile Ad hoc Networks (MANET) are the extension of the wireless networks. These networks are playing crucial role in the each and every field of the human life. They are used in those places where a simple wireless network cannot use. They play a significant role in real tile applications such as military applications, home applications wireless sensor applications etc. Due to their adaptive nature they are threatened by number of attacks such as Modification, Black Hole attack, Wormhole attack etc. Wormhole attack is one of the dangerous active attacks in the mobile Ad hoc Networks (MANET). In this paper a secure and efficient approach for the detection of the wormhole attack in the Mobile Ad Hoc Networks (MANET) is described. The algorithm is implemented in a very popular on demand routing protocol, called DSR (Dynamic Source Routing) protocol. In this approach the solution is provided by sending the Hound Packet in the order of Fibonacci series and also modifies the table entries in terms of storing them in sorted order, so that the processing of Route Discovery becomes faster.

References
  1. Sunil Taneja and Ashwani Kush, "A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010 ISSN: 2010-0248
  2. . Marianne A. Azer, , IEEE, Sherif M. El-Kassas, and Magdy S. El-Soudani, " An Innovative Approach for the Wormhole Attack Detection and Prevention In Wireless Ad Hoc Networks", in IEEE Conference, 2008.
  3. Kuldeep Sharma, Dr. G. Mahadevan, "Advance Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", Int. J. on Recent Trends in Engineering & Technology, Vol. 05, No. 01, Mar 2011.
  4. Sun Choi, Doo-Young Kim, Do-Hyem Lee, "WAP:Wormhole Attack Prevention Algorithm in Mobile AD-HOC network", Sensor network, Ubiquitous and Trustworthy Computing 2008, SUTC'08
  5. Vih-chun-hu, Adrian Perrig, David B. Johnson, "Packet Leashes: A defense against Wormhole Attack in Wireless Mobile AD-HOC network", Rice University Department of computer science. Technical Report TRO1-384 December 17, 2001
  6. A. A. Pirzada and C. McDonald, "Detecting and evading wormholes in mobile ad-hoc wireless networks", International Journal of Network Security, 3(2):191C202, Sept. 2006.
  7. S. Capkun, J. -P. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks", Proceedings of MobiHoc, 2003.
  8. S. Capkun, M. Cagalj, and M. Srivastava, "Secure localization with hidden and mobile base stations", Proceedings of the 25th IEEE International Conference on Computer Communications Societies (INFOCOM '06), Barcelona, Spain, April 2006.
  9. Saurabh Gupta, Subrat Kar, S Dharmaraja, WHOP: Wormhole Attack Detection Protocol using Hound Packet, 2011 International conference on innovations in information technology.
  10. Ritesh Maheshwari, Jie Gao, Samir R Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information", in IEEE INFOCOM 2007, Alaska. .
Index Terms

Computer Science
Information Sciences

Keywords

DSR Fibonacci Series Hound Packet Proactive Reactive Table Entries Wormhole Attack