Prevention Of WormholeAttacks In Geographic Routing Protocol
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS) attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS) uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSR)protocol and analysis and simulations are performed in network simulator (NS-2).
Authors and Affiliations
E. Poornima , C. Shoba Bindhu
Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs
Several approaches have been proposed to perform routing in Delay/Disruption Tolerant Networks (DTNs) which has a random connectivity pattern. As the routing path from the source to destination will not be available alwa...
Comparative and Analysis of Biometric Systems
Biometric as the science of recognizing an individual based on his or her physical or behavioral traits, it is beginning to gain acceptance as a legitimate method for determining an individual identity. Biometric have no...
Service Composition in Service Oriented Product Line
The paradigm of Service Oriented Architecture (SOA) and Software Product Line Engineering (SPLE) discipline facilitate the development of families of software-intensive products. Software Product Line practices can be le...
Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio
In the fingerprint recognition system the main goal of the fingerprint enhancement algorithm is to reduce the noise present in the image. There are several factors that affect the quality of the acquired fingerprint imag...
Development of a vibration monitoring system for optimization of the electrical energy production
This article presents the development of a vibration monitoring system based on the method of spectral analysis at a strategic facility such as a feed pump in a thermal power plant and that the aim of optimizing the prod...