International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Mobile Ad hoc Networks (MANETs) are multi-hop, wireless, infrastructure less collection of self organizing mobile hosts that form a temporary cooperative network without the aid of any base station. Every node in the network is capable of functioning as a mobile router. Nodes are free to move arbitrarily, thus the network topology changes rapidly and randomly at unpredictable times. Because of dynamic topology nodes can enter and leave network at any time, during this, malicious nodes can enter and harms the network. So security is an essential service for wired and wireless network communication. There are many solutions to detect and prevent this attack like packet leashes, hop count analysis etc., but these methods do not provide perfect solution. In this paper a novel method has been focused on detection and prevention of the Cooperative wormhole attack using MD5 algorithm, packet filtering and implemented using AODV routing protocol. MD5 algorithm generates unique ids for all the nodes. Packet filtering and packet forwarding methods are also used for transferring the packets in secure path from source to destination. The experimental results are obtained by varying the concentration of wormhole nodes and are analyzed in terms of throughput, end to end delay and packet delivery ratio. The results demonstrate the efficiency of the proposed method.

Keywords: MANETs, Wormhole Attack, AODV protocol, Message Digest 5 MD5

Edition: Volume 3 Issue 12, December 2014

Pages: 2302 - 2305


How to Cite this Article?

Anuradha T, Padmashree S. Shedbalkar, "Detection and Prevention of Cooperative Wormhole Attack in a MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB141029, Volume 3 Issue 12, December 2014, 2302 - 2305

25 PDF Views | 26 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'MANETs'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 597 - 602

Performance Analysis of Mobile Ad-Hoc Networks Under the Attacks

Abhishek Kumar, Shweta Kumari

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2176 - 2178

Detection & Removal of Co-operative Blackhole Attack in MANETs

Mayuri Ghorpade, Prof. S. P. Medhane

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1987 - 1989

Secured Routing Using ALERT in MANETs

Aniket K. Khasnikar, Smita Kapse

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3268 - 3272

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

Bhagyashri Thakre, Archana Raut

Share this article



Similar Articles with Keyword 'Wormhole Attack'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1422 - 1430

Security Schemes to Resolve Wormhole Attack in Distributed Sensor Networks

Sharada Y. Yalavigi, Dr. Krishnamurthy G. N, Dr. Nandini Sidnal

Share this article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2158 - 2164

Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network

Mahendra Dhole, Anand Gadwal

Share this article



Similar Articles with Keyword 'AODV protocol'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1128 - 1132

Network Performance Optimization based on AODV Routing in MANET

Deependra Kumar Jha, Anurag Jain, Susheel Jain

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2674 - 2680

Enhanced AODV Routing for Secure MANET Using Preventing Gray Hole Attack

Jagdish J. Rathod, Amit. M. Lathigara

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1002 - 1007

Cryptography Techniques based on Security of AODV in MANETs - A Survey

Ankita Singh, Mahima Sharma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2184 - 2187

Detection of Distributed Denial of Service Attack

Danveer Singh, Kalicharan Sahu

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2302 - 2305

Detection and Prevention of Cooperative Wormhole Attack in a MANET

Anuradha T, Padmashree S. Shedbalkar

Share this article
Top