TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS
Keywords:
wormhole attack, MANET, Threshold, RTT, RREQ, Hop countAbstract
MANET (Mobile ad hoc network) is one of the most frequently used research domain in communication technology. MANET provides random mobility, decentralized control and wireless communication. Due to these properties, in current scenario the network suffers from various security threats and performance issues. Therefore, security enhancement in MANET is required. In MANET, security can be improved by cryptography and trust based solution. We are investigating a new solution using trust based approach in MANET.
There are various attacks on network layer in MANET. Wormhole attack is a severe attack; malicious node by cooperating with another node forwards the packets from one node to another by creating a tunnel. There by these cooperative mischievous nodes attract the legitimate traffic to use their tunnel. Hence security is compromised.
In order to defend against the wormhole attach the proposed work uses, combination of parameters like energy, number of connections and buffer length of a node. Trust value of node is computed based on these parameters. The approach compares trust of node with threshold value of network trust. The result of this comparison clarifies that selected node is either malicious or legitimate.
The proposed concept is implemented by extending AODV (Ad hoc On Demand Distance Vector) routing protocol and the performance of the proposed routing protocol is evaluated and compared with the AODV under attack. According to the comparative outcomes the performance of the proposed trust based security approach is much efficient and adoptable against wormhole attacks in MANET.
References
Yudhvir singh et al., wormhole Attack Avoidance Technique in Mobile Adhoc Networks, Conference on Advanced Computing & Communication Technologies, IEEE,2013.
Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen et al., Composite Trust-based Public Key Management in Mobile Ad Hoc Networks, ACM 28th Symposium on Applied Computing,2013
Marianne Azer, Sherif EI-Kassas, Magdy EI-Soudani et al., International Journal of Computer Sceince and Security, May 2009.
Gurpreet Kaur, Er. Sandeep Kaur Dhanda et al., International Journal of Advanced Research in Computer and Communication Engineering, August 2013
Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Issa Traore et al.,Timed And Secured Monitoring Implementation Against Wormhole Attack in AODV-Based Mobile Ad Hoc Networks, IEEE, May 2013
Mohammad Rafiqul Alam, King Sun Chan et al.,RTT-TC: Topological Comparison Based Method to Detect Wormhole Attacks in MANET, IEEE, 2010
Soo Young Shin, Eddy Hartono Halim eet al., Wormhole Attack Detection in MANETs using Route Redundancy and Time-based Hop Calculation, IEEE,2012.
Naveen Kumar Gupta, Kavita Pandey et al., Trust Based Ad-hoc On Demand Routing Protocol for MANET,IEEE, 2013
Chee-Wah Tan, Sanjay Kumar Bose,et al.,Modifying AODV for Efficient Power-Aware Routing in MANETs,IEEE,2011
Aarti, Dr. S.S. Tyagi et al., Study of MANET: Characteristics, Challenges, Application and Security Attacks, International Journal of Advanced Research in Computer Science and Software Engineering, 2013
A. Jain and V. Tokekar. “Classification of denial of service attacks in mobile ad hoc networks,” Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pages 256–261, 2011
A. Jain and V. Tokekar, “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile Ad hoc Networks”,Proceedings of International conference on pervasive computing (ICPC), 2015.
Downloads
Published
Issue
Section
License
Copyright Notice
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in World Scholars journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.