CFP last date
20 May 2024
Reseach Article

Securing MANET against Wormhole Attack using Neighbor Node Analysis

by Sweety Goyal, Harish Rohil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 81 - Number 18
Year of Publication: 2013
Authors: Sweety Goyal, Harish Rohil
10.5120/14227-2478

Sweety Goyal, Harish Rohil . Securing MANET against Wormhole Attack using Neighbor Node Analysis. International Journal of Computer Applications. 81, 18 ( November 2013), 44-48. DOI=10.5120/14227-2478

@article{ 10.5120/14227-2478,
author = { Sweety Goyal, Harish Rohil },
title = { Securing MANET against Wormhole Attack using Neighbor Node Analysis },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 81 },
number = { 18 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 44-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume81/number18/14227-2478/ },
doi = { 10.5120/14227-2478 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:56:26.292446+05:30
%A Sweety Goyal
%A Harish Rohil
%T Securing MANET against Wormhole Attack using Neighbor Node Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 81
%N 18
%P 44-48
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make a tunnel using a high speed network. This paper focuses on providing a solution for secure transmission through the network and proposes a neighbor node analysis approach to identify wormhole attack and removes wormhole link in MANET. The proposed work is simulated using NS-2 and is analyzed using certain parameters such as throughput, loss rate, delay rate.

References
  1. Achint Gupta, Priyanka V J, Saurabh Upadhyay, "Analysis of wormhole Attack inAODV based MANET Using Opnet Simulator", International Journal of Computing, Communications and Networking Vol. 1, October 2012.
  2. Jatin D. Parmar, Ashish D. Patel, Rutvij H. Jhaveri1, Bhavin I. Shah, " MANET Routing Protocols and Wormhole Attack against AODV", IJCSNS International Journal of Computer Science and Network Security, Vol. 10, No. 4, April 2010.
  3. Reshmi Maulik, Nabendu Chaki, "A Study on Wormhole Attacks in MANET", International Journal of Computer Information Systems and Industrial Management Applications ISSN 2150-7988 Vol. 3, pp. 271-279, 2011.
  4. K. Sivakumar, Dr. G. Selvaraj, "Analysis of Worm Hole Attack In MANET And Avoidance Using Robust Secure Routing Method", International Journal of Advanced Research in Computer Science and Software Engineering Vol. 3, No. 1, January 2013.
  5. Yashpalsinh Gohil, Sumegha Sakhreliya, Sumitra Menaria, " A Review on Detection and Prevention of Wormhole Attcaks in MANET", International Journal of Scientific and Research Publications, Vol. 3, No. 2, February 2013.
  6. Abari Bhattacharya, Himadri Nath Saha, " A Study of Secure Routing in MANET various attacks and their countermeasures", IEMCON organized in collaboration with IEEE in January 2011.
  7. Susheel Kumar, Vishal Pahal, Sachin Garg, " Wormhole Attack in Mobile Ad Hoc Networks: A Review", IRACST, Vol. 2, April 2012.
  8. Xia Wang, Johnny Wong, "An End-to-end Detection of Wormhole Attack in Wireless Ad hoc Networks", 31st Annual International Computer Software and Applications Conference IEEE, 2007.
  9. Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature", IEEE, 2011.
  10. Waseem Ahad, Manju Sharma, "Efficient Multipath Algorithm in MANETs to Prevent Wormhole Attack", CT International Journal of Information &Communication Technology Vol. 1, No. 1, 2013.
  11. P. Anitha, M. Sivaganesh, "Detection And Prevention Of Wormhole Attacks In Manets Using Path Tracing", International Journal of Communications Networking System, Vol. 01, No. 02, December 2012.
  12. Shalini Jain, Dr. Satbir Jain, " Detection and prevention of wormhole attack in mobile adhoc networks" , International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Attack AODV Routing Network Security MANET