CFP last date
20 May 2024
Reseach Article

Reputation based Efficient Isolation of Wormhole Nodes

by T. Padmavathy, G. Sumathi, K. Srinivasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 7
Year of Publication: 2013
Authors: T. Padmavathy, G. Sumathi, K. Srinivasan
10.5120/11975-7838

T. Padmavathy, G. Sumathi, K. Srinivasan . Reputation based Efficient Isolation of Wormhole Nodes. International Journal of Computer Applications. 70, 7 ( May 2013), 21-24. DOI=10.5120/11975-7838

@article{ 10.5120/11975-7838,
author = { T. Padmavathy, G. Sumathi, K. Srinivasan },
title = { Reputation based Efficient Isolation of Wormhole Nodes },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 7 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number7/11975-7838/ },
doi = { 10.5120/11975-7838 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:15.950611+05:30
%A T. Padmavathy
%A G. Sumathi
%A K. Srinivasan
%T Reputation based Efficient Isolation of Wormhole Nodes
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 7
%P 21-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Adhoc Network (MANET) is infrastructure less as it does not require any specialized router to do the routing tasks. Instead, each and every node in MANET acts as a router as well to perform the routing tasks with the dependability on a routing protocol. This feature of MANET leads to serious security threats affecting the performance of the network. The attacks may be done at various layers of the network. Thus, security becomes the vital service for the success of MANET. Network Layer protocols extend connectivity from neighboring 1-hop nodes to all other nodes in MANET. A variety of attacks targeting the network layer have been identified. One such critical problem is wormhole attack. This paper proposes a reputation based isolation of wormhole node, which provides a trust computation to the Worm Hole Avoidance protocol (WARP), leaving the normal node without any support for additional hardware . It combines the advantages of WARP and the basic trust model.

References
  1. Ming Yang Su, WARP: Worm Hole Avoidance Routing protocol by anomaly detection in mobile adhoc networks in Computers and Security 29(2010). pp. 208-224.
  2. Asad Amir Pirzada and Chris McDonald,Establishing Trust in Pure Adhoc Networks in 27th Australian Computer Science Conference, The University of Otago, Dunedin, New Zealand.
  3. C. Siva Ram Murthy and B. S. Manoj," Adhoc Wireless Networks Architectures and Protocols", Prentice Hall, 2004.
  4. Y. Hu, A. Perrig, and D. Johnson: Packet leashes: a defense againstwormhole attacks in Wireless Ad Hoc Networks. In Proceedings of theIEEE Conference on Computer Communications (Infocom), 2003.
  5. H. S. Chiu and K. S. Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks," In Proc. International Symposium on Wireless Pervasive Computing, Phuket, Thailand, Jan. 2006.
  6. Tran Van Phuong, Ngo TrongCanh, Young-Koo Lee, SungyoungLee, and Heejo Lee. Transmission time based mechanism to detect wormhole attacks. In the proceedings of the IEEE Asia-Paci?c service computing conference; 2007. pp. 172–8
  7. S. Marti, T. J. Giuli, K. Lai, M. Baker, "Mitigating Routing Misbehavior in Mobile Ad HocNetworks," Proc. of MobiCom 2000, Boston, August 2000.
  8. Network Simulator: http://www. isi. edu/nsnam/ns
Index Terms

Computer Science
Information Sciences

Keywords

Enhanced WARP WORMDETECT CALCTRUST