Analysis of Effectiveness of ALERT Protocol against Wormhole Attack in MANETs
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 5
Abstract
Routing in MANETs is one of the challenging issues because it dynamically changes their topology over the time and hence requires an efficient routing protocol to communicate among the mobile nodes. There are several routing protocols proposed for MANET environment categorized as non-location based protocols and locationbased protocols. Among all routing protocols the location based routing protocols are preferred in MANETs as they are more efficient in routing compared with the non-location based routing protocols. On the other hand security is also the challenging issue in the MANET due to its feature like open access medium, lack of central monitoring and management etc. and therefore increased the possibility of eavesdropping, spoofing, and denial-of-service attacks. The wormhole attack is one of the stronger active attacks which are difficult to avoid/detect in any network where the two or more attacker nodes tunnel the network traffic information from one location to another in the network. In this paper we focus our study on efficient location based routing protocol ALERT and their effectiveness measure against wormhole attack based on parameters like throughput,end-2-end delay ,packet delivery ratio and normalized routing load. The performance analysis is done for 10,20,30,40 and 50 nodes using the network simulator (NS- 2.35).A comparative study is represented on above parameters for all five scenarios.
Authors and Affiliations
Devendra Kumar*
ENHANCING DATA AVAILABILITY THROUGH REPLICATION IN MOBILE ADHOC NETWORKS
A Mobile Ad-hoc Network (MANET) is a self-configured infrastructure-less network. It consists of autonomous mobile nodes that communicate over bandwidth-constrained wireless links. Nodes in a MANET are free to...
RENEWABLE ENERGY RESOURCES TO REDUCE CO2 EMISSIONS IN DATACENTERS WITH IP-OVER-WDM NETWORK IN CLOUD COMPUTING
As cloud computing consent increases, the energy consumption of the network and of the computing resources that underpin the cloud is growing and causing the emission of enormous quantities of CO2. Research is now...
OPTIMIZATION OF MILLING MACHINING PROCESS PARAMETERS: A REVIEW
In this competition era, manufacturing and industrial industries are switching to the non conventional machining processes instead to the conventional machining process. Many of the new machining tools available in mark...
Multi Level Anti Theft Security System using GSM Technology
This paper presents Design & Development of Multi level Anti theft security system to control the theft of a vehicle using GSM and Biometrics. The main objective of this is to offer an advanced security system...
Nonlinear Process Identification using Neural Networks
In industry process control, the model identification of nonlinear systems are always difficult problems. The main aim of this paper is to establish a reliable model for the nonlinear process. In many applications...