An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET

نویسندگان

  • Kapil Raghuwanshi
  • Amit Saxena
  • Manish Manoria
  • S. K. Sarkar
  • T. G. Basavaraju
  • D. B. Roy
  • R. Chaki
چکیده

'Mobile ad hoc network (MANET)' is an infrastructure less, self controlled wireless network it doesn't need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and 'wormhole attack' is also present in those attacks. It is the most powerful attack and very difficult to detect in 'wormhole attack' two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of 'wormhole attack' is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing MANET against Wormhole Attack using Neighbor Node Analysis

In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...

متن کامل

Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communica...

متن کامل

Avoiding Wormhole Attack in MANET using Statistical Analysis Approach

MANET is a collection of mobile hosts with wireless network interfaces that form a temporary network without any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avo...

متن کامل

A two-phase wormhole attack detection scheme in MANETs

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...

متن کامل

A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption

In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015