IJERT-EMS
IJERT-EMS

Mitigation of Wormhole Attack using Exclusive Algorithms in Manets


Mitigation of Wormhole Attack using Exclusive Algorithms in Manets
Authors : Pooja A Patil, Anuradha. T
Publication Date: 27-08-2017

Authors

Author(s):  Pooja A Patil, Anuradha. T

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Volume. 6 - Issue. 08 , August - 2017

e-ISSN:   2278-0181

 DOI:  http://dx.doi.org/10.17577/IJERTV6IS080196

Abstract

Advancement in wireless technologies and extended the use of wireless devices demand more and more infrastructure less networks like mobile ad hoc networks. As mobile adhoc network applications fan out security emerges as a central requirement. Wireless networks gain higher performance by using network coding .Network coding is a promising generalization of routing, which allows a node to generate output messages by encoding its received messages. However network coding also introduces new attacks such, as well studied pollution attacks and wormhole attack. Wormhole attack, sabotage the performance gain of network coding. Since the characteristics of the network coding system are distinctly different from traditional wireless networks .In wormhole attack malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which relays it locally. A centralized algorithm proposed to detect wormholes and show its correctness attendant For the distributed wireless network, DAWN, a Distributed detection Algorithm against Wormhole in wireless Network coding systems is proposed by delving into the change of the flow directions of the innovative packets caused by wormhole. Both the algorithms use node centric information instead of packet centric information, as the underlying network use network coding .Simulation results on NS 2 exhibit the effectiveness of the proposed algorithms in detecting wormhole attacks.

Citations

Number of Citations for this article:  Data not Available

Keywords

Key Word(s):    

Downloads

Number of Downloads:     7
Similar-Paper

Call for Papers - May - 2017

        

 

                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book