Prevention Of WormholeAttacks In Geographic Routing Protocol
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS) attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS) uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSR)protocol and analysis and simulations are performed in network simulator (NS-2).
Authors and Affiliations
E. Poornima , C. Shoba Bindhu
Record Matching Over Query Results Using Fuzzy Ontological Document Clustering
Record matching is an essential step in duplicate detection as it identifies records representing same real-world entity. Supervised record matching methods require users to provide training data and therefore cannot be...
A novel application for transmission of Orthogonal Embedded Images by using Morphological Transform Domain & cryptographic methods
This paper proposes a data-hiding technique for water marked images and secured transmission of those watermarked images to the destination . today’s lot of companies are stored their data in the images, they store data...
Power Saving Scheme (PSS) in Clusters of Heterogeneous ireless Sensor Networks
In this paper, we proposed a Power Saving Scheme (PSS) multi-hop sensor network using partition clusters. It avoids collision and idle listening time of sensor nodes for better overall network life time. The basic sensor...
Removal of Salt and Pepper Noise from highly Corrupted Images using Mean Deviation statistical parameter
A novel idea of using median deviation parameter in estimating the noise in the images is proposed and successfully applied to both gray level as well as color images. The median filter which is very popular in removing...
Enhanced Component Retrieval Scheme Using Suffix Tree in Object Oriented Paradigm
In today’s world software are used everywhere i.e. every electronic devices use software. So there is a large demand of software but in the same proportion the development is not growing. It is similar to the supply dema...