Review Papers | Electronics & Communication Engineering | India | Volume 3 Issue 12, December 2014
A Review on Intrusion Detection and Security of Wormhole Attacks in MANET
Ankita Khanna, P.U.Dere
Abstract: Mobile Adhoc network consists of various mobile nodes communicating with each other without a fixed infrastructure. As the users communicate using lack of boundaries, attacks on MANET routing are significant and of main concern. By the literature study we survey wormhole attacks, find out mechanisms to detect wormhole attacks and provide security using DSR protocol to ensure a system safe from such attacks. Intrusion detection is done by studying the traffic collected from the MANET at three different stages: i) regular operation, ii) with a wormhole joining distant parts of the network, and iii) under stress from wormhole attackers who control a link in the MANET and drop packets at random. Our focus is on detecting anomalous behavior using timing analysis of routing traffic within the network. Security has become a primary concern in order to provide protected communication in Wireless as well as wired environment. Security mechanism will be done by considering the routing paths of different packets by securing the packets from malicious attacks. This is done by sending RREQ and receiving RREP messages between intermediate nodes so as to ensure delivery of packets. We analyze the performance of system by using Dynamic Source Routing (DSR) routing protocol for maintaining security.
Keywords: WORMHOLE ATTACKS
Edition: Volume 3 Issue 12, December 2014,
Pages: 873 - 876
How to Cite this Article?
Ankita Khanna, P.U.Dere, "A Review on Intrusion Detection and Security of Wormhole Attacks in MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14300, Volume 3 Issue 12, December 2014, 873 - 876
How to Share this Article?
Similar Articles with Keyword 'WORMHOLE'
Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks
Riyazahmed A Jamadar, Mousami. S Vanjale
Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks
Gurmeet Singh, Deepinder Singh, Dr. Ravi Kant
Similar Articles with Keyword 'ATTACKS'
A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking
Jagtap. D. V, M. D. Patil
New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS
Aruna P Adhav, K T Jadhao