CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol

by Vijay Kumar, Ashwani Kush
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 4
Year of Publication: 2012
Authors: Vijay Kumar, Ashwani Kush
10.5120/6251-8394

Vijay Kumar, Ashwani Kush . Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol. International Journal of Computer Applications. 44, 4 ( April 2012), 15-21. DOI=10.5120/6251-8394

@article{ 10.5120/6251-8394,
author = { Vijay Kumar, Ashwani Kush },
title = { Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 4 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 15-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number4/6251-8394/ },
doi = { 10.5120/6251-8394 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:34:40.853912+05:30
%A Vijay Kumar
%A Ashwani Kush
%T Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 4
%P 15-21
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, Non infrastructural environment and dynamic topology. In Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and Power efficiency are the major concerns in this field. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The proposed scheme named as worm_secure is intended to incorporate security aspect on existing protocols . This paper checks one of the common attack on MANET as wormhole and tries solving the situation. Scheme has been incorporated on AODV and results have been calculated using NS2.

References
  1. Kush, Ashwani June 2009 Security and Reputation Schemes in Ad-Hoc Networks Routing, International Journal of Information Technology and Knowledge Management, Volume 2, No. 1, pp. 185-189.
  2. Kush, A. March 2009 Security Aspects in AD hoc Routing, Computer Society of India Communications, Vol. no 32 Issue 11, pp. 29-33.
  3. Bouam S. and Othman J. B. Sept. 7-10, 2003 Data Security in Ad hoc Networks using MultiPath Routing, in Proc. of the 14th IEEE PIMRC, pp. 1331-1335.
  4. Ghazizadeh S. , Ilghami O. , Sirin E. , and Yaman F. Nov. 6-8,2002 Security-Aware Adaptive Dynamic Source Routing Protocol, In Proc. of 27th Conference on Local Computer Networks, pp. 751-760.
  5. D. B. J. , Yih-Chun Hu, Perrig Adrian, Sept. 2002 Ariadne: A secure on-demand routing protocol for ad-hoc networks, Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002).
  6. Inkinen Kai 2004-04-26/27 New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes, Helsinki University of Technology T-110. 551, Seminar on Internetworking.
  7. Wenjia Li, Joshi Anupam 2008 Security Issues in Mobile Ad Hoc Networks- A Survey, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, http://www. cs. umbc. edu/~wenjia1/ 699_report. pdf.
  8. Qian L. , Song N. , and Li X. Marh 2005 Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path, In Proc. IEEE Wireless Communications & Netwoking Conference (IEEE WCNC), New Orleans, USA. .
  9. Lazos L. , Poovendan R. , Meadows C. , Syverson P. , and Chang L. W. March 2005 Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach, In Proc. IEEE Wireless Communications & Netwoking Conference (IEEE WCNC), New Orleans, USA.
  10. Khalil I. , Bagchi S. , and Shroff N. B. July 2005 LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks, In Proc. International Conference on Dependable System and Networks (DSN), Yokohama, Japan.
  11. Chiu H. S. and Lui K. S. January 2006 DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks, In Proc. International Symposium on Wireless Pervasive Computing, Phuket, Thailand.
  12. Hu Y. C. , Perrig A. and Johnson D. B. February 2006 Wormhole Attacks in Wireless Networks, In IEEE JSAC, Vol. 24, No. 2, pp. 370-380.
  13. Hu Y. C. , Perrig A. , & Johnson D. 2006 Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications , 370-380.
  14. Jen S. M. , Laih,C. S. and Kuo W. C. 2009 A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET sensors, 5022-5039.
  15. Lazos L. , Poovendran R. , Meadows C. , Syverson P. and Chang L. 2005 Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach, Wireless Communications and Networking) Washington: IEEE Conference, pp. 1193 – 1199.
  16. Zhu S. , Setia S. and Jajodia S. 2003 LEAP: efficient security mechanisms for large-scale distributed sensor networks, Proceedings of the 10th ACM conference on Computer and communications security New York: ACM, pp. 62 - 72.
  17. Wang X. and Wong J. 2007 An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks, 31st Annual International Computer Software and Applications Conference, Washington, DC, USA: IEEE Computer Society, (p. 8).
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Networks Modified Aodv Aodv Performance Evaluation