A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 1
Abstract
In Mobile Ad hoc Network (MANET) mobile node is responsible for route establishment using wireless link where each node may behave like both as a host and router. MANET encounters number of security threats because of its open entrusted environment, with little security arrangement, security over MANET can be enhance up to some satisfactory level because of its inherent characteristics. Among some of the prominent security threats wormhole attack is considered to be a very serious security threat over MANET. In wormhole two selfish node which is geographically very far away to each other makes tunnel between each other to hide their actual location and give the illusion that they are true neighbours and attract other nodes to make conversation through the wormhole tunnel. Many researchers focused on detecting wormhole attack and its prevention mechanism. It seems that in the previous technique there is a need to improve their results in the brink of false negative rate, routing overhead etc. The present paper has proposed the hybrid model in order to detect and prevent the wormhole attack. This approach has been work with neighbour node and hop count method.
Authors and Affiliations
Pratima Singh
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network
Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance &nbs...
Traffic Congestion Detection in Vehicular Adhoc Networks using GPS
In today’s world traffic congestion is the critical issue. Huge amount of time, fuel and money is wasted due to traffic jams all around the world. Drivers select the path that they consider will be the fastest; however t...
The Cyberspace and Intensification of Privacy Invasion
Abstract: The widespread adoption of cyberspace for exceptional socio-economic activities, especially as it isconnecting populations around the globe in ways never foreseen is raising fresh security issues. What is...
A Survey on Fuzzy Association Rule Mining Methodologies
Fuzzy association rule mining (Fuzzy ARM) uses fuzzy logic to generate interesting association rules. These association relationships can help in decision making for the solution of a given problem. Fuzzy A...
Six Sigma and CMMI
Abstract: Quality is essential in every walks of life and in all business for their success and profitability. There are many quality improvement initiatives and they are doing their part well. The startups and ini...