CFP last date
22 April 2024
Reseach Article

A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET

by Neha Sahu, Deepak Singh Tomar, Neelam Pathak
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 6
Year of Publication: 2014
Authors: Neha Sahu, Deepak Singh Tomar, Neelam Pathak
10.5120/15575-4132

Neha Sahu, Deepak Singh Tomar, Neelam Pathak . A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET. International Journal of Computer Applications. 90, 6 ( March 2014), 1-4. DOI=10.5120/15575-4132

@article{ 10.5120/15575-4132,
author = { Neha Sahu, Deepak Singh Tomar, Neelam Pathak },
title = { A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 6 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number6/15575-4132/ },
doi = { 10.5120/15575-4132 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:18.879184+05:30
%A Neha Sahu
%A Deepak Singh Tomar
%A Neelam Pathak
%T A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 6
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm hole is consider to be a very serious security threat over MANET. In worm hole two selfish node which is geographically very far away to each other, makes tunnel between each other to hide their actual location and try to believe that they are true neighbours and makes conversation through the wormhole tunnel. Recently research will focus over wormhole detection and avoiding path but existing technique having lower network overhead, lower battery power consumption in order to longer survival of network with fast response. This paper introduce a modified AODV protocol that detect and avoid wormhole path over MANET towards secure routing , which is based on an hybrid model that encapsulate location, neighbor node and hop count method.

References
  1. Maulik, R. ; Chaki, N. , "A comprehensive review on wormhole attacks in MANET" IEEE 2010, Page 233-238.
  2. Jian Yin, Sanjay Madria, "A hierarchical secure routing protocol against black hole attack in sensor networks", IEEE SUTC, 2006.
  3. Xiangyang Li "Wireless Ad Hoc and Sensor Networks: Theory and Applications" Cambridge University Press 978-0-521-86523-4
  4. Sebastian Terence J , "Secure Route Discovery against Wormhole Attack in Sensor Networks using Mobile Agents", IEEE 2011, pp 110-115.
  5. C. Perkins, E. Belding-Royer, "Ad hoc On-Demand Distance Vector (AODV) Routing," The Internet Society 2003.
  6. Sang-min Lee, Keecheon Kim "An Effective Path Recovery Mechanism for AODV Using Candidate Node" springerlink, vol. 4331/2006, 2006.
  7. Mahajan, V. ; Natu, M. ; Sethi, A. , "Analysis of wormhole intrusion attacks in MANETS", IEEE 2008, Page 1-7.
  8. Keer, S. ; Suryavanshi, A. , "To prevent wormhole attacks using wireless protocol in MANET" IEEE 2010, Page 159-163.
  9. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, "A secure routing protocol for ad hoc networks," in Proc. of IEEE ICNP, 2002.
  10. Dang Quan Nguyen ; Lamont, L. , "A Simple and Efficient Detection of Wormhole Attacks", IEEE 2008, Page 1-5.
  11. Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  12. Kanika Lakhani, Himani bathla, Rajesh Yadav "A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET" IJCSNS International Journal of Computer Science and Network Security, vol. 10 No. 5, May 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Ad-hoc network wormhole threshold AODV