International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Review Papers | Electronics & Communication Engineering | India | Volume 3 Issue 12, December 2014


A Review on Intrusion Detection and Security of Wormhole Attacks in MANET

Ankita Khanna, P.U.Dere


Abstract: Mobile Adhoc network consists of various mobile nodes communicating with each other without a fixed infrastructure. As the users communicate using lack of boundaries, attacks on MANET routing are significant and of main concern. By the literature study we survey wormhole attacks, find out mechanisms to detect wormhole attacks and provide security using DSR protocol to ensure a system safe from such attacks. Intrusion detection is done by studying the traffic collected from the MANET at three different stages: i) regular operation, ii) with a wormhole joining distant parts of the network, and iii) under stress from wormhole attackers who control a link in the MANET and drop packets at random. Our focus is on detecting anomalous behavior using timing analysis of routing traffic within the network. Security has become a primary concern in order to provide protected communication in Wireless as well as wired environment. Security mechanism will be done by considering the routing paths of different packets by securing the packets from malicious attacks. This is done by sending RREQ and receiving RREP messages between intermediate nodes so as to ensure delivery of packets. We analyze the performance of system by using Dynamic Source Routing (DSR) routing protocol for maintaining security.


Keywords: WORMHOLE ATTACKS


Edition: Volume 3 Issue 12, December 2014,


Pages: 873 - 876


How to Cite this Article?

Ankita Khanna, P.U.Dere, "A Review on Intrusion Detection and Security of Wormhole Attacks in MANET", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB14300, Volume 3 Issue 12, December 2014, 873 - 876

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'WORMHOLE'

Downloads: 107

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1410 - 1413

Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks

Riyazahmed A Jamadar, Mousami. S Vanjale

Share this Article

Downloads: 121

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1311 - 1315

Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks

Gurmeet Singh, Deepinder Singh, Dr. Ravi Kant

Share this Article

Similar Articles with Keyword 'ATTACKS'

Downloads: 1

Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1067 - 1069

A Secure Text (Missile Co-ordinate) Transmission Using Digital Watermarking

Jagtap. D. V, M. D. Patil

Share this Article

Downloads: 104

Research Paper, Electronics & Communication Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1367 - 1371

New Approach of Intrusion Detection for Malicious Behavior Detection in MANETS

Aruna P Adhav, K T Jadhao

Share this Article
Top