Downloads: 115 | Views: 279
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.4 / 10
Detection of Hidden Tunnel Attack in Mobile Ad-Hoc Network
Mahendra Dhole, Anand Gadwal
Abstract: Mobile ad-hoc network is an infrastructure less and self-organizing concept of network organization. Due to the ad-hoc environment of network there are various security and safety issues arises in the network such as routing security issue and data forwarding security issue. These security issues decrease the network performance in terms of throughput and other performance parameters like packet delivery ratio and routing overhead. The security of network resources is breaches by the malicious nodes which may moreover internal or external. Malicious nodes influence the network working by putting the numerous kinds of attacks. This work proposed a technique to detect wormhole attack which played via malicious node. To detect the malicious node or attacker various scheme have advised by researches which focus round trip time of packet. The advised schemes DelPHI and Packet Travel Time have some drawbacks like reliability, message overhead, and delay. This particular work is proposed to resolve the drawbacks of these schemes by evaluating the performance parameters of network.
Keywords: Mobile ad-hoc network, security, malicious nodes, wormhole attack, round trip time
Edition: Volume 5 Issue 6, June 2016
Pages: 2158 - 2164
DOI: https://www.doi.org/10.21275/NOV164827
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 97
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1112 - 1116Scalable Uninterrupted Network Service Using LTE
S. Kalaiyarasi, M. Manikandan
Downloads: 100
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015
Pages: 1353 - 1357Analysis of Energy Efficiency and Throughput for IEEE 802.11 based Mobile Adhoc Networks
Manpreet Kaur, Pooja Saini
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 2269 - 2272Detecting Malicious Nodes for Secure Route Discovery in MANETs
Zalte S. S., Dr. Ghorpade V. R.
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 972 - 976Geo-Location Based Light Weight Bunching Algorithm for Hetro MANETs
Pidakala Sowmya, Kare Suresh Babu
Downloads: 104
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 741 - 745Priority Queuing Approach for Video Streaming Over Mobile Adhoc Network Using WEAC Protocol
A. Kamatchi, Dr. Annasaro Vijendran