CFP last date
20 May 2024
Reseach Article

Enhancement of Routes Performance in MANET Avoiding Tunneling Attack

by Pushpendra Niranjan, Manish Shrivastava, Rajpal Singh Khainwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 42 - Number 12
Year of Publication: 2012
Authors: Pushpendra Niranjan, Manish Shrivastava, Rajpal Singh Khainwar
10.5120/5746-7951

Pushpendra Niranjan, Manish Shrivastava, Rajpal Singh Khainwar . Enhancement of Routes Performance in MANET Avoiding Tunneling Attack. International Journal of Computer Applications. 42, 12 ( March 2012), 28-32. DOI=10.5120/5746-7951

@article{ 10.5120/5746-7951,
author = { Pushpendra Niranjan, Manish Shrivastava, Rajpal Singh Khainwar },
title = { Enhancement of Routes Performance in MANET Avoiding Tunneling Attack },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 42 },
number = { 12 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume42/number12/5746-7951/ },
doi = { 10.5120/5746-7951 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:31:08.934874+05:30
%A Pushpendra Niranjan
%A Manish Shrivastava
%A Rajpal Singh Khainwar
%T Enhancement of Routes Performance in MANET Avoiding Tunneling Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 42
%N 12
%P 28-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANET consists of spatially distributed autonomous small devices which creates a self connected environment. MANETs are originally motivated by military applications such as border surveillance and battlefield monitoring; today MANET can be used in many civilian applications, including home automation, healthcare, traffic control and habitat/environment monitoring. basic security services of MANET include authentication, confidentiality, integrity, anonymity and availability. However, in contrast to traditional wireless networks, in MANET [1], physical security of sensor nodes are not granted as they are usually deployed in remote and hostile environments. Therefore, attackers can easily compromise sensor nodes and use them to degrade the network's performance. Due to lack of physical security, the existing security solutions that are developed for traditional wireless networks cannot be directly employed in MANET. The security requirements of many protocols changed the situation and a more detailed research is currently underway to develop secure ad hoc routing protocols. MANETs are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures and open medium of communication, which, unlike their wired counterparts, cannot be secured. This paper focuses on wormhole based attacks and their detection mechanisms are analyzed. In this paper we specifically considering Tunneling attack which do not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting suspicious routes as in previous methods, we implement a new method which detects the attacker nodes and works without modification of protocol, using a hop-count and time delay analysis from the viewpoint of users without any special environment assumptions. The proposed work is simulated using OPNET-14, and results showing the advantages of proposed work.

References
  1. A. Akyildiz, I. F. Su, W. Sankarasubramaniam, and E. Cayirci. "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102?114, Aug. 2002
  2. S. Hadim and S. N. Mohamed. "Middleware challenges and approaches for wireless sensor networks," IEEE Distributed Systems, vol. 7, no. 3, pp. 1?23, Mar. 2006.
  3. Hu, Y. C. ; Perrig, A. ; Johnson, D. B. Wormhole Attacks in Wireless Networks. IEEE J. Sel. Area Comm. 2006, 24, 370–380.
  4. S. Pal, A. K. Mukhopadhyay, and P. P. Bhattacharya. "Defending mechanisms against sybil attack in next generation mobile ad-hoc networks," ITEE Technical Review Journal, vol. 25, no. 4, pp. 209?14, Jul-Aug. 2008.
  5. J. R. Douceur. "The sybil attack," Proceedings of the International Workshop on Peer-to-Peer Systems, pp. 251?60, Mar. 2002.
  6. D. Glynos, P. Kotzanikolaou, and C. Douligeris. "Preventing impersonation attacks in MANET with multi-factor authentication," Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp. 59?64, Apr. 2005
  7. Y. C. Hu, A. Perrig, and D. B. Johnson. "Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks," Proceedings of 22nd IEEE INFOCOM, pp. 1976?86, Apr. 2003
  8. Z. Tun and A. H. Maw. "Wormhole attack detection in wireless sensor networks," Proceedings of World Academy of Science Engineering and Technology, vol. 46, pp. 545?50, Dec. 2008.
  9. K. U. Khan, A. V. Reddy, R. U. Zaman, K. A. Reddy, and T. S. Harsha. "An efficient DSDV routing protocol for wireless mobile ad-hoc networks and its performance comparison," Second UKSIM European Symposium on Computer Modeling and Simulation, pp. 506?11, Sep. 2008.
  10. Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole detection in wireless ad-hoc networks," Department of Computer Science, Rice University, Technical Report TR01-384, Jun. 2002
  11. J. Zhen and S. Srinivas. "Preventing replay attacks for secure routing in ad-hoc networks," Proc. of 2nd Ad Hoc Networks and Wireless, pp. 140?50, 2003.
  12. S. Özdemir, M. Meghdadi, and Ý. Güler. "A time and trust based wormhole detection algorithm for wireless sensor networks," (manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC?08), pp. 139?4, 2008.
  13. A. A. Pirzada and C. S. McDonald. "Circumventing sinkholes and wormholes in ad-hoc wireless networks," Proceedings of International Workshop on Wireless Ad-hoc Networks, London, England, Kings College, London, 2005
  14. D. B. Johnson, D. A. Maltz, and Y. Hu. "The dynamic source routing protocol for mobile ad-hoc networks," IETF MANET, Internet Draft. Available from: http://www. cs. cmu. edu/~dmaltz/internet-drafts/draft-ietf-manet-dsr-09. txt [last cited in 2003].
Index Terms

Computer Science
Information Sciences

Keywords

Sensor Node Tunneling Attack Battlefield Monitoring Habitat/environment Protocols Manet