Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Wormhole Detection and Prevention using Profile base Mechanism in MANET

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 95 - Number 7
Year of Publication: 2014
Authors:
Gajendra Singh
Amrita Gayakwad
10.5120/16610-6447

Gajendra Singh and Amrita Gayakwad. Article: Wormhole Detection and Prevention using Profile base Mechanism in MANET. International Journal of Computer Applications 95(7):47-52, June 2014. Full text available. BibTeX

@article{key:article,
	author = {Gajendra Singh and Amrita Gayakwad},
	title = {Article: Wormhole Detection and Prevention using Profile base Mechanism in MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {95},
	number = {7},
	pages = {47-52},
	month = {June},
	note = {Full text available}
}

Abstract

A Mobile Ad hoc Network (MANET) is a collection of self-configurable mobile node connected through wireless links. Absence of central controller it is difficult to determine the reliable & secure communication in Mobile Ad hoc network. Worm hole attack that are work as to established path in between sender and receiver but if the sender has start data transmission then in that case the worm hole attacker has create a direct link, referred to as a wormhole tunnel between them, it means more of the number of trusted nodes it means higher successful data communication process rates may well expected. In this desertion we proposed detection as well as prevention technique against wormhole attack, for detection we use profile base detection technique and get attacker node information like node number, number of attack packet, attack time etc. after that we prevent wormhole attack using neighbor trust worthy base technique and secure the mobile ad-hoc network communication, through our proposal we provide secure as well as reliable communication and simulate through network simulator-2 and analyze the network behavior in attack and prevention case.

References

  • Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature", 3rd IEEE International Conference on Communication Software and Networks (ICCSN), pp. 307 – 311, 2011.
  • Husain. Shahnawaz, Gupta S. C. , Chand Mukesh "Denial of Service Attack in AODV & Friend Features Extraction to Design Detection Engine for Intrusion Detection System in Mobile Ad-hoc Network", International Conference on Computer & Communication Technology (ICCCT-2011), pp. 292- 297, 2011.
  • Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao, Mohammad S. Obaidat, Ting-Yun Chi, Sanjay K. Dhurandher "Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks", proceedings of IEEE Global Telecommunications Conference (GLOBECOM 2011), pp. 1-5, 2011.
  • Dr. N. Sreenath, A. Amuthan, & P. Selvigirija "Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs", International Conference on Computer Communication and Informatics (ICCCI -2012), pp. 1-7, 2012.
  • K. S. Sujatha, Vydeki Dharmar, R. S. Bhuvaneswaran "Design of Genetic Algorithm based IDS for MANET", International Conference on Recent Trends in Information Technology (ICRTIT), pp. 28-33, 2012.
  • Dr Karim KONATE, GAYE Abdourahime "Attacks Analysis in mobile ad hoc networks: Modeling and Simulation", 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, pp. 367 – 372, 2011.
  • Gandhewar, N. , Patel, R. "Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network", Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 714 – 718, 2012.
  • Singh, P. K. Sharma, G. "An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 902 – 906, 2012.
  • Jian-Ming Chang, Po-Chun Tsou ; Han-Chieh Chao ; Jiann-Liang Chen "CBDS: A Cooperative Bait Detection Scheme to prevent malicious node for MANET based on hybrid defense architecture", 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronics Systems Technology (Wireless VITAE), pp. 1-5, 2011.
  • http://www. isi. edu/nsnam/ns/.