Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3

Abstract

 Abstract: Mobile Ad hoc networks are increasingly popular these days as they function without major requirements of state of the art infrastructure and the fact that they can function without the need for a central controlling authority. The widespread usage of the MANETs (Mobile Ad hoc networks) also poses some serious problems in them. Because of the high availability of MANETs and improper security measures make the MANETs a ready target for attackers which adopt both active and passive approach to attack the MANET. A classic attack on a MANET is a DOS attack of which wormhole attack is most noteworthy as it is easy to deploy and can cause great damage to the network. In the wormhole attack, an adversary connects two distant points in the network using a direct low-latency communication link in the MANET which is called as wormhole link. Once a wormhole is established, the adversary captures the wireless transmissions on one end and send them through the wormhole link and replays them on the other end. There are many methods available for wormhole detection which include in some cases the use of sophisticated hardware and in other cases makes some modification to the already present information in the MANET. The presence of a wormhole may also be detected in some cases by the use of time delays or geographical locations. A wormhole can be detected when the network has already been set up and wormhole nodes try to penetrate at a later time and secondly when the wormhole nodes were already present in the time of network setup. In this paper, we adopt a new approach which is different from the already existing approaches of wormhole detection. The approach adopted by us has the benefit of saving memory and processing which is an improvement over the other techniques of wormhole detection. It also advocates the use of a modified routing table wherein the routing table will be modified to have an extra consisting of full paths of each node next to the hop. Using this approach of modified routing table, we can identify suspicious links long before the attack takes place and starts disturbing the network. This approach is implemented on various routing protocols with the help of NS3 and a comparative analysis has been made for the same. A comparison of this approach with some other techniques of wormhole detection is also carried out to highlight the effectiveness and efficiency of this approach.

Authors and Affiliations

Gauri Mathur , Raj Karan Singh , M. Vijaya Raju

Keywords

Related Articles

Map-Reduce Synchronized and Comparative Queue Capacity Scheduler in Hadoop for Extensive Data

Abstract: Map-Reduce is drawing attention of both industrial and academic for processing of big data. In this paper, we have mainly focused on core scheduler of Hadoop i.e. Capacity Scheduler. The scheduler assigns tasks...

Prevention of Cheating Message based on Block Cipher using Digital Envelope

Abstract: Quick assessment of advanced information trade happens as of late. Because of that security of data is much critical in information stockpiling and transmission process. That implies there is a need to shield t...

 Review and Performance Comparison of Distributed Wireless  Reprogramming Protocols: SDRP and ISDRP

 A Reprogramming service should be efficient, reliable and secured in Wireless sensor network. Wireless reprogramming for wireless sensor network emphasize over the process of changing or improving the  funct...

 Computational Method for Forensic Verification of offline Signatures

 Signature verification models based on personal model have been reported by many researchers in past but the method proposed here is a forensic document examination approach using computational methods, unlike ot...

 Correlation Coefficient Based Average Textual Similarity Modelfor Information Retrieval System in Wide Area Networks

 Abstract: In wide area networks, retrieving the relevant text is a challenging task for information retrievalbecause most of the information requests are text based. The focus of paper is on the similarity measurem...

Download PDF file
  • EP ID EP152530
  • DOI 10.9790/0661-16368491
  • Views 86
  • Downloads 0

How To Cite

Gauri Mathur, Raj Karan Singh, M. Vijaya Raju (2014).  Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques. IOSR Journals (IOSR Journal of Computer Engineering), 16(3), 84-91. https://europub.co.uk/articles/-A-152530