A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of higher safety to defend against attacks; however, each has specific defense objects, and is unable to defend against particular attacks. Of all the types of attacks, the wormhole attack poses the greatest threat and is very difficult to prevent; therefore, this paper focuses on the wormhole attack, by combing three techniques. So that our proposed scheme has three techniques based on hop count, decision anomaly, neighbor list count methods are combined to detect and isolate wormhole attacks in ad hoc networks. That manages how the nodes are going to behave and which to route the packets in secured way.
Authors and Affiliations
A. VANI , D. Sreenivasa Rao
Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise
Wireless Sensor Networks (WSNs) are widely used in applications like location monitoring, object tracking and decision making systems. Movement patterns of mobile sensor nodes play an important role in such systems. This...
Implementation of ETAS (Embedding Text in Audio Signal) Model to Ensure Secrecy
Steganography is the art of hiding information that evolves as a new secret communication technology. For a long period time, information hiding was done using plain text, still images, video and IP datagram. Embedding s...
An Experiential Survey on Image Mining Tools, Techniques and Applications
Digitization in every sector leads to the growth of digital data in a tremendous amount. Digital data are not only available in the form of text but it is also available in the form of images, audio and video. Decision m...
The Importance of Feature Selection in Classification
Feature Selection is an important technique for classification for reducing the dimensionality of feature space and it removes redundant, irrelevant, or noisy data. In this paper the feature are selected based on the...
PRIORITY BASED UPLINK SCHEDULER FOR IEEE 802.16 NETWORKS
IEEE 802.16, the standard for fixed, portable and mobile Broadband Wireless Access (BWA) systems, is promising to support different classes of traffic with Quality of Service (QoS). The Medium Access Control (MAC) protoc...