Downloads: 109
Review Papers | Electronics & Communication Engineering | India | Volume 3 Issue 12, December 2014
A Review on Intrusion Detection and Security of Wormhole Attacks in MANET
Ankita Khanna | P.U.Dere
Abstract: Mobile Adhoc network consists of various mobile nodes communicating with each other without a fixed infrastructure. As the users communicate using lack of boundaries, attacks on MANET routing are significant and of main concern. By the literature study we survey wormhole attacks, find out mechanisms to detect wormhole attacks and provide security using DSR protocol to ensure a system safe from such attacks. Intrusion detection is done by studying the traffic collected from the MANET at three different stages: i) regular operation, ii) with a wormhole joining distant parts of the network, and iii) under stress from wormhole attackers who control a link in the MANET and drop packets at random. Our focus is on detecting anomalous behavior using timing analysis of routing traffic within the network. Security has become a primary concern in order to provide protected communication in Wireless as well as wired environment. Security mechanism will be done by considering the routing paths of different packets by securing the packets from malicious attacks. This is done by sending RREQ and receiving RREP messages between intermediate nodes so as to ensure delivery of packets. We analyze the performance of system by using Dynamic Source Routing (DSR) routing protocol for maintaining security.
Keywords: WORMHOLE ATTACKS
Edition: Volume 3 Issue 12, December 2014,
Pages: 873 - 876
Similar Articles with Keyword 'WORMHOLE'
Downloads: 107
Survey Paper, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1410 - 1413Threats and Attacks Analysis of Routing Protocols for Wireless Sensor Networks
Riyazahmed A Jamadar | Mousami. S Vanjale
Downloads: 121
M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1311 - 1315Performance Evaluation of Different Protocols under Blackhole and Wormhole Attacks
Gurmeet Singh [4] | Deepinder Singh [5] | Dr. Ravi Kant