A Mathematical Approach towards Mitigating the Effects of Wormhole Attack
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2014, Vol 4, Issue 1
Abstract
Mobile Ad-hoc or spontaneous wireless networks are threatened by a powerful attack known as the wormhole attack. The wormhole attack is very powerful and preventing the attack has proven to be difficult. A strategic placement of the wormhole can result in a significant breakdown in communication across a wireless network. The nature of wireless ad hoc and sensor networks make them very attractive to attack. The detailed simulation of the wormhole attack can reflect the strength and nature of the attack. In this paper we studied the impact of the wormhole attack on the respective networks. The Wormhole attack was simulated on Different scenarios. The parameters like Average delay, Route discovery time, Average Hop length were calculated and effects were studied using different scenarios for evaluating the impact on MANETs. Comparing the results of both AODV and Proposed Protocol to analyze which of these two types of protocols are less vulnerable to Wormhole attack.
Authors and Affiliations
Dr. Arun Kumar Singh| Professor, Department of Computer Engineering Sobhasaria Engineering College Sikar, Rajasthan, India, Deepak Agarwal| M. Tech. Scholar, Computer Science and Engineering Sobhasaria Engineering College Sikar, Rajasthan, India
Space Time Block Coding for MIMO Systems With Low Decoding Complexity
MIMO systems with multiple antenna elements at both link ends are an efficient solution for future wireless communications systems as they provide high data rates by exploiting the spatial domain under the constraints of...
Peak to Average Power Ratio Reduction in OFDM System by Clipping and Filtering
This paper results clipping and filtering technique for peak to average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM). Our simulation results show that this technique removes inband an...
Audio Steganography in a Nutshell
Information hiding technique is a new kind of secret communication technology. Steganography has been proposed as a new alternative technique to enforce data security. A perfect audio Steganographic technique aim at embe...
Analytical Model Analysis Of Distributed Cooperative Spectrum Sensing Method
Spectrum sensing is a key function of cognitive radio to prevent the harmful interference with licensed users and identify the available spectrum for improving the spectrum’s utilization. Various methods for spectrum sen...
System On Chip: Performance Analysis Of VLSI Based Networking System
The swell in the numeral of cores that can be incorporated on a distinct chip has forced the designer to use computer system concepts for design of System on Chip (SoC).The supplementary is of multiple protocols being...