A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of higher safety to defend against attacks; however, each has specific defense objects, and is unable to defend against particular attacks. Of all the types of attacks, the wormhole attack poses the greatest threat and is very difficult to prevent; therefore, this paper focuses on the wormhole attack, by combing three techniques. So that our proposed scheme has three techniques based on hop count, decision anomaly, neighbor list count methods are combined to detect and isolate wormhole attacks in ad hoc networks. That manages how the nodes are going to behave and which to route the packets in secured way.
Authors and Affiliations
A. VANI , D. Sreenivasa Rao
An Investigation on Cloud data Storage and Confidentiality Techniques
Cloud computing gives an enormous measure of virtual storage to the clients. Cloud storage essentially serves to little and medium scale commercial enterprises. This will lessen their ventures and support of capacity ser...
Public key cryptosystem and a key exchange protocol using tools of non-abelian group
Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...
Stream Ciphers Encript Transformation
In this paper the initiative has been taken to review the flaws which have lead to the decline of stream ciphers in public domain. This review of the flaws in the existing stream cipher systems had lead to the developmen...
Building Classification System to Predict Risk factors of Diabetic Retinopathy Using Text mining
This Making medical decisions such as diagnosing the diseases that cause a patient’s illness is often a complex task. The Diabetic retinopathy is one of the complications of iabetes and Diabetic retinopathy is one of th...
Preprocessing and Screen-Cursor Mapping for a Virtual TouchScreen on a Projected Area
Virtual Touch Screen, on a projected area, is a system in which the projection on any ordinary flat surface provides us a graphical work-field for controlling specific kind of operations without any sophisticated touch s...