Downloads: 124 | Views: 248
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 6 Issue 8, August 2017 | Popularity: 6.8 / 10
Defending Wormhole Attack using Cryptographic Routing Technique
Malvika Rajput, C.P. Singh
Abstract: The wireless communication networks frequently replace the traditional wired networks. Due to its low cost of installation and easy maintenance. The wireless networks allow a user to join the network and consume the services network services. Additionally, that also allows moving the user in any direction randomly. Mobile ad hoc network is similar kind of network where the devices working as both sender and receiver. In this network, the device to device communication is possible by the relaying communication, therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted then it can be altered or modify the messages transmitted towards the designation host. Therefore a mechanism is required to enhance the current communication technique in mobile ad hoc network. Therefore, in this presented work, the security in ad hoc networks is investigated, the investigation leads to find a solution for wormhole attack. In this attacker, a group of attackers is deployed in the network and harm the privacy and security of the network. Therefore a solution with the cryptographic manner to prevent the information forwarded to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. In this approach, the watch dog method is used for identifying the malicious host in the network and tries to boycott using the presented method during the route discovery. The implementation of the proposed work is performed on the basis of the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol is evaluated in terms of end to end delay, throughput, packet delivery ratio, and packet drop ratio. Additionally to justify the solution the proposed routing protocols performance is compared with the traditional EAACK and the AODV routing protocol during the attack conditions. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.
Keywords: MANET, AODV, Routing, Security, wormhole, cryptography
Edition: Volume 6 Issue 8, August 2017
Pages: 736 - 742
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad