Detection and Prevention of Wormhole Attack in Wireless Sensor Network
|
|
- Lucinda Hardy
- 5 years ago
- Views:
Transcription
1 Detection and Prevention of Wormhole Attack in Wireless Sensor Network Aaditya Jain 1, Shalini Sharma 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, India 2 B.Tech, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, India 3 Professor, Department of Computer Science & Engg., R. N. Modi Engineering College, Rajasthan Technical University, Kota, Rajasthan, India ABSTRACT Wireless Sensor networks are comprised of many small and resource constrained sensor nodes that are deployed in an environment for many applications which require unattended, long-term operations. They are vulnerable to many kinds of attacks because of no specific network topology. Therefore interest in research of security in wireless sensor network has been increasing since last several years. Wormhole attack is one of the severe attack used to destabilize or disable wireless sensor networks. The idea behind this attack, is two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. In this paper, the numbers of techniques dealing with detection and prevention of wormhole attack in wireless sensor networks are surveyed. Keywords: Wireless Sensor Network, Wormhole Attack, Wormhole Detection & Prevention, MAODV. 1. INTRODUCTION Wireless sensor networks (WSNs) are built with a very large number of tiny light weighted and inexpensive sensor nodes that have typically resource constrained, limited memory, with low battery backup sensors, slow embedded processors, and low bandwidth. The technology allows nodes in a network to communicate directly with each other using wireless transceivers without need for a fixed infrastructure. In WSN a node is capable to perform the processing, and gathering of the sensor information for communication with all other connected nodes in the network. Sensors are the hardware devices: they measure and produce a proper response by a physical condition like pressure or temperature. Sensors are monitored by using a physical data parameter. Each node of the sensor network consist of the three subsystems: the sensor subsystem which senses the environment, the processing subsystem which performs local computations on the sensed data and the communication subsystem which is responsible for message exchange with neighboring sensor nodes [1]. The application scenarios for WSNs are many, including military surveillance, commercial, environment, medical, manufacturing and home automation to name many but few. Currently, most WSN applications are designed to operate in trusted environments. However, security issues are a major concern when WSNs are deployed in untrusted environments [2]. The vulnerability of wormhole attack is high in WSN because it is a passive attack as it does not require the information about the cryptographic infrastructure of the network, hence it puts an attacker in a beneficial or strong position. 2. WORMHOLE ATTACK Wormhole attack is a devastating attack where two malicious colluding sensor nodes create a virtual tunnel in the wireless sensor network as shown in figure1, which is used to forward message packets between the tunnel edge points [3], [4]. This can be achieved by either compromising two or more sensor nodes of the network or adding a new set of malicious nodes to the network. The tunnel can be established in many ways e.g. in-band and out-of-band channel. This makes the tunneled packet arrive either sooner or with a lesser number of the hopes compared to the packets transmitted over normal multi hop routes. This creates the illusion that the two end points of the tunnel are very close to each other. However, the main aim behind the attack is to disrupt the correct operation of WSN s routing protocols [5]. Volume 5, Issue 2, February 2016 Page 138
2 Figure1 Basic strategy of wormhole attack[4] 3. WORMHOLE DETECTION AND PREVENTION TECHNIQUES The main concept in detecting presence of wormhole in a network is to find out if node is transmitted out of its transmitting range. That can be found out if the packet received is not one of its neighbors. In this paper several wormhole detection and prevention techniques are discussed. All the techniques are having their own benefits and limitations. 3.1 Packet leashes approach Y. Hu et al. in [6] proposed an approach called packet leashes. It prevents packets from traveling farther than radio transmission range. The wormhole attack can be detected by an unalterable and independent physical metric, such as time delay or geographical location. It overcomes wormhole attack by restricting the maximum distance of transmission, using either tight time synchronization or local information. Temporal leash is to ensure that the packet has an upper bound on its lifetime. The drawback of this is that they need highly synchronized clocks. Geographical leash is to ensure that the recipient of the packet is within a certain distance from the sender. The drawback of this scheme is that, each node must know its own location and all nodes must have loosely synchronized clocks. Because clock synchronization is resource demanding, and thus, packet leashes have limited applicability in wireless sensor networks. 3.2 Directional antenna and anchor based approach Hu and Evans in [7] have attempted to detect wormholes by equipping network nodes with directional antennas so they can all have the same orientation. Lazos and Poovendran in [8] have applied a similar idea in their secure localization scheme called SeRLoc. SeRLoc employs about 400 anchor nodes in a 5,000 node network. Each anchor node has a directional antenna and knows its physical location. Other nodes in the network use anchor nodes to locate themselves. Since a wormhole produces shortcuts in a network, the directional antennas deployed at anchor nodes help detect the attack; nodes can then defend against the attack by discarding incorrect localization messages. However, SeRLoc is unable to detect wormhole attacks when anchor nodes are compromised, especially nodes located near one of the ends of a wormhole. A graph-theoretic framework in [9] has also been proposed for detecting wormhole attacks. However, the framework relies on guard nodes, which are functionally similar to anchor nodes. 3.3 Delphi Approach Chiu and Lui in [10] introduce a delay analysis approach called DELPHI. It calculates mean delay per hop of every possible route. DELPHI applied a multi-path approach, and recorded the delay and hope counts in transmitting RREQ and RREP through the paths. After collecting all response, the sender computes mean delay per hop of each route. The path with the wormhole attacks, the delay would be obviously longer than the normal path with the same hop count. Hence, the path with longer delays would not be selected to transmit data packet and wormhole nodes could be avoided. 3.4 Localization based system approach Chen et al. in [11] have discussed about Localization Based Systems, which are susceptible to wormhole attacks as they can disturb the localization procedure. For preventing the effect of wormhole attack, a distance consistency based secure location scheme was projected, which incorporated wormhole attack detection, valid location recognition and self localization. To achieve secure localization in the network and shielding against wormhole attack, Chen et al. in [12] make a conflicting set for each node to use all differing sets of its adjacent locators for filtering out incorrect distance measurements of its adjacent locators. But the downside of this method is that it only works properly when the Volume 5, Issue 2, February 2016 Page 139
3 system has no packet loss. As the attackers may drop the packets intentionally, the packet loss is unavoidable when the system is underneath a wormhole attack. 3.5 Trust based system approach Ozdemir et al. in [13] used a Trust Based Model for the identification of wormhole in the sensor network. In trust based systems, each source node uses its trust information to calculate the most reliable path to a particular destination by circumventing intermediary malicious nodes. A wormhole in a system have the least trust level if that wormhole drops all the packets and if all the packets sent reach the destination then the neighboring node of a source node will have the highest trust level. It is a combined time and trust based model which detects the compromised nodes for false detection. These two models run together. Malicious nodes on the path can give the wrong impression about the time based module by providing incorrect information. To prevent this problem, trust based module always observes the first module and calculates trust values of neighbor nodes. These values are used to modify the path next time. Figure2 Trust based model 3.6 Secure routing protocol based approaches Sankaran et al. in [14] proposed an approach called SAW and Khin Sandar Win in [15] proposed an approach called DAW. Similar methodologies are discussed in both but the major difference is the use of routing protocols. SAW approach uses AODV routing protocol [16] and DAW approach uses DSR routing protocol [17]. In both approaches, trust based security models have been proposed and used to detect intrusion. Arithmetical methods are used to identify the wormhole attack. If any link is found to be doubtful, then existing trust information is used to identify the wormhole tunnel. In this trust model, nodes observe neighbors based on the pattern of their packet drop but not on the number of packet drops. In [15], another algorithm for detecting the presence of wormhole WSN is proposed. Here, after sending the RREQ, the source waits for the RREP. The source receives many RREP coming through different routes. The link with very high frequency is checked and the value is checked with a previously defined threshold coefficient value. If the number of packet drop is higher than the number of packets sent, then there is the presence of wormhole. Chaurasia and Singh in [18] presented efficient method to detect a wormhole attack called Modified Wormhole Detection AODV protocol (MAODV). Detection of wormhole attack is performed using number of hops in different paths from source to destination and delay of each node in different paths from source to destination. It compares the delay per hop of every node in the normal path and a path that is under wormhole attack, finds that delay per hop of a path that is wormhole attack is larger in comparison of normal path. Drawback is that this method does not work well when all the paths are wormhole affected. Parmar and Vagela in [20] proposed a technique to detect and prevent the wormhole attack in the wireless network efficiently using Ad Hoc on Demand Multipath Distance Vector Routing Protocol (AOMDV). AOMDV is an extension to the AODV protocol to discover multiple paths between the source and the destination in every route discovery process [19]. The idea behind the scheme in [20] is note time when the source node broadcasts a RREQ packet and when the corresponding RREP packet is received by the source, again note the received time of the packet. By using the above two values one can calculate the round trip time of the established route or routes. Take round trip time of each route and divide it by respective hop count. With the help of this value say calculate the average round trip time of all the Volume 5, Issue 2, February 2016 Page 140
4 routes. The value obtained is threshold round trip time. Compare the threshold value with each round trip time. If the total round trip time is less than threshold round trip time and hop count of that particular route is equal to two than wormhole link is present in that route else no wormhole link present in that route. Since wormhole link detected in that route, sender detects first neighbour node as wormhole node and sends dummy RREQ packet through that route and neighbour. At the destination end receiver receives dummy RREQ packet from its neighbour and detects neighbour as wormhole node and routing entries are removed from the source node and broadcast to other nodes. Thus wormhole affected link is blocked and is no more used. So, that from the next onwards whenever a source node needs a route to that destination, first it checks in the routing table in the route established phase for a route and it will come to know that, the route is having wormhole link and it will not take that route instead it will take another route from the routing list of the source node which is free from wormhole link if available. Figure3 Wormhole detection with AOMDV protocol 3.7 Topological detection approach Dong et al. in [21] fundamentally analyze the wormhole problem using a Topological Methodology and propose an effective distributed approach. This approach relies solely on network connectivity information, without any requirements on special hardware devices or any rigorous assumptions on network properties. Collection of homogeneous nodes deployed over a surface of terrain. Each node performs the homogeneous transmission control and is only capable of communicating with adjacent nodes. Main idea behind the scheme is observing the inevitable topology deviations introduced by wormholes and by detecting non separating loops, this approach can detect and locate various wormholes. 4. CONCLUSION Wormhole attacks in WSNs can significantly degrade network performance and threaten network security. It comes in the category of passive attacks so difficult to detect in WSN. In this paper firstly we have discussed what wormhole attack is actually and how it is work in WSNs. This paper also throws light on various existing wormhole detection and prevention techniques in WSNs. All the techniques have their own advantages and limitations. But there is no detection and prevention technique is present which detects wormhole attack perfectly in all situations, so it is still an open challenge problem. REFERENCES [1] I. Akyildiz, W. Su, Y. Sankara subramaniam and E. Cayirci, A survey of sensor networks, IEEE Communications, vol. 40(8), pp , [2] Abhishek Jain, Kamal Kant, Security Solutions for Wireless Sensor Networks, IEEE Second International Conference on Advanced Computing and Communication Technologies, pp , [3] Majid Meghdadi, Suat Ozdemir and Inan Guler; A Survey of Wormhole-based Attacks and their countermeasures in Wireless Sensor Networks ; IETE tech. reveiw, vol. 28(2), Mar.-Apr., [4] Priya Maidamwar and Nekita Chavhan; A survey on Security issues to detect wormhole attack in wireless sensor network ; IJANS vol. 2(4), Oct., 2012 [5] Yih-Chun Hu, Member, IEEE, Adrian Perrig, Member, IEEE, and David B. Johnson, Member, IEEE, Wormhole Attacks in Wireless Networks, IEEE Journal on selected areas in Communications, vol. 24, no. 2, February2006 Volume 5, Issue 2, February 2016 Page 141
5 [6] Y. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, Proceedings of the Twenty Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp , [7] L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, Proceedings of the Eleventh Network and Distributed System Security Symposium, pp , [8] L. Lazos and R. Poovendran, SeRLoc: Robust localization for wireless sensor networks, ACM Transactions on Sensor Networks, vol. 1(1), pp , [9] R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Networks, vol. 13(1), pp , [10] H.S. Chiu and K. Lui. DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks. In Proceedings of Inter-national Symposium on Wireless Pervasive Computing, pp. 6-11, [11] H. Chen, W. Lou, X. Sun, and Z. Wang. "A secure localization approach against wormhole attacks using distance consistency," EURASIP Journal on Wireless Communication and Net-working-Special Issue on Wireless Network Algorithms, Systems, and Applications, pp , [12] H. Chen, W. Lou, and Z. Wang. "Conflicting-set-based worm-hole attack resistant localization in wireless sensor networks," Book Chapter Lecture Notes in Computer Science Ubiquitous Intelligence and Computing, vol. 5585/2009, pp , [13] S. Ozdemir, M. Meghdadi, and Ý. Guler. "A time and trust based wormhole detection algorithm for wireless sensor net-works," (manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC 08), pp , 2008 [14] M.S. Sankaran, S. Poddar, P.S. Das, S. Selvakumar. A Novel Security model SaW: Security against Wormhole attack in Wire-less Sensor Networks. In Proceedings of International Conference on PDCN, [15] Khin Sandar Win. Analysis of Detecting Wormhole Attack in Wireless Networks, World Academy of Science, Engineering and Technology, 48, pp , [16] Aaditya Jain and Dr. Bala Buksh, Solutions for Secure Routing in Mobile Ad Hoc Network- A Survey, Imperial Journal of Interdisciplinary Research Vol. 2, Issue [17] Aaditya Jain, Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET, International Journal of Engineering Research and General Science, Vol. 4, Issue 1, [18] Umesh Chaurasia and Varsha Singh, MAODV: Modified Wormhole Detection AODV Protocol. IEEE 2013.Pg [19] S. R. Biradar, Koushik Majumder, Subir Kumar Sarkar, Puttamadappa S.R.Biradar, Performance Evaluation and Comparison of AODV and AOMDV, (IJCSE) International Journal on Computer Science and Engineering, Vol. 02, No. 02, 2010, Pg [20] Parmar Amish and V. B. Vagela, International Journal of Electrical and Electronics Engineers, Vol. 07, Issue 01, Jan- June [21] Dezun Dong, Mo Li, Yunhao Liu, Xiang- Yang Li and Xiangke Liao, Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks, IEEE Transactions on Networking, Vol. 19, No. 6, December AUTHORS Aaditya Jain is currently pursuing M.Tech in Computer Engg. from RMEC Kota, which is affiliated to Rajasthan Technical University, Kota (Raj). He received B.E. degree in Computer Science & Engg. from MIT Mandsaur which is affiliated to Rajiv Gandhi Technical University, Bhopal (MP) in He published research papers in various International and National Journals and Conferences. His areas of interests are Network Security, Cryptography, Ad Hoc Networks and Wireless Sensor Networks. Shalini Sharma is currently pursuing B.Tech final year in Computer Science & Engg. from RMEC Kota, which is affiliated to Rajasthan Technical University, Kota (Raj). Her area of interests are Wireless Networks and Information-Security. Dr. Bala Buksh is the Director of RMEC Kota (Raj). He has done his MS and Ph.D. in Computer Science from Birmingham (U.K.). He published various research papers in International and National Journals and Conferences. His research interests are computer network, Wireless Sensor Network and Ad hoc Network. He is Ex. General Manager from ONGC and has rendered his services in the industry for more than 30 years. He had been pioneer in implementing enterprise wide IT applications in the area of Oil & Natural Gas Exploration, Production and Drilling activities for automation and on live availability on a single platform. Volume 5, Issue 2, February 2016 Page 142
A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department
More informationA Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029
More informationA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS Subhashis Banerjee 1 and Koushik Majumder 2 1 Department of Computer Science & Engineering, West Bengal University of Technology,
More informationAnalysis of Worm-Hole Attack in MANET using AODV Routing Protocol
Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,
More informationPerformance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET
Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET Aaditya Jain M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering College,
More informationLink-Based Wormhole Detection in Wireless Sensor Networks
Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,
More informationDetection and Removal of Black Hole Attack in Mobile Ad hoc Network
Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically
More informationDETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationA SURVEY ON SECURITY ISSUES TO DETECT WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
A SURVEY ON SECURITY ISSUES TO DETECT WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Priya Maidamwar 1 and Nekita Chavhan 2 1 Wireless Communication & Computing, Department of Computer Science & Engineering,
More informationWormhole Attack in Wireless Ad-Hoc Networks
Wormhole Attack in Wireless Ad-Hoc Networks Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour Abstract Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack,
More informationInternational Journal of Advance Research in Engineering, Science & Technology. A Survey on Wormhole Attack in MANET
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 A Survey on Wormhole Attack
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying
More informationRound Trip Time based Wormhole Attacks Detection
Round Trip Time based Wormhole Attacks Detection Zaw Tun and Ni Lar Thein University of Computer Studies, Yangon zawtun78 @gmail.com, nilarthein@gmail.com Abstract The nature of wireless ad hoc and sensor
More informationA Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks
A Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks Sushant S. Bahekar 1, Prashant Panse 2 1 M. Tech Student, Departemnt of Computer Engineering, SVCE, Indore,
More informationReview Paper on Wormhole Attack
Review Paper on Wormhole Attack Garima Kadian CSE Department, DCRUST DCRUST, Murthal, Sonipat, India Dinesh Singh, PhD ABSTRACT A Wireless Networks are more accessible to different types of attack than
More informationA DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM
A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM Ms. Nivethitha N, Mr. NandhaKumar S, Ms. Meenadevi M Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering
More informationWormhole Attack Detection Protocol using Time Stamp with Security Packet.
Wormhole Attack Detection Protocol using Time Stamp with Security Packet. Chandraprabha Rawat Department of Computer Application Samrat Ashok Technological Institute Vidisha, India. Abstract- The Mobile
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationPerformance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3
International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi
More informationWormhole Detection and Prevention in MANET: A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.980
More informationDetection of Vampire Attack in Wireless Adhoc
Detection of Vampire Attack in Wireless Adhoc Network Ankita Shrivastava 1 ; Rakesh Verma 2 Master of Engineering Research Scholar, Medi-caps Institute of Technology and Management 1 ; Asst. Professor,
More informationDr. K. Chitra Manikandan 2 2 Asst.Professor, Govt. Arts College, Melur, Madurai.
1760 Comparison of Different Methods to identify wormhole attacks in MANETS S.Seethalakshmi 1 1 Asst.Professor, Thiagarajar School Of Management, Madurai 625005, India. sita110378@gmail.com Dr. K. Chitra
More informationE2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks
2012 26th International Conference on Advanced Information Networking and Applications Workshops E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks Sanjay Kumar Dhurandher
More informationReview on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks
RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile
More informationWAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationDefending MANET against Blackhole Attackusing Modified AODV
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 2 August 214 ISSN(online) : 2349-784X Defending MANET against Blackhole Attackusing Modified AODV Devang S. Patel P.G. Student
More informationReview:- EN-efficient Approaches for MANETs in Rushing Attacks
Review:- EN-efficient Approaches for MANETs in Rushing Attacks Rashmi Vishwakarma Sumit Dhariwal Mohmmed.Imran Deptt.Of CSE Deptt.Of CSE HOD,Deptt.Of CSE JNCT Rewa M.P, India SIRTE Bhopal M.P, India JNCT
More informationA Survey - Energy Efficient Routing Protocols in MANET
, pp. 163-168 http://dx.doi.org/10.14257/ijfgcn.2016.9.5.16 A Survey - Energy Efficient Routing Protocols in MANET Jyoti Upadhyaya and Nitin Manjhi Department of Computer Science, RGPV University Shriram
More informationKeywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationPRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS
PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.
More informationCharacterizing the Impact of Black-Hole Attacks on Elastic and Inelastic applications in MANETs
Characterizing the Impact of Black-Hole Attacks on Elastic and Inelastic in MANETs Tania Nagpal, Krishan Kumar M. Tech Research Scholar, Associate Professor SBS State Technical Campus, Ferozepur Punjab,
More informationSecurity in Mobile Ad-hoc Networks. Wormhole Attacks
Security in Mobile Ad-hoc Networks Wormhole Attacks What are MANETs Mobile Ad-hoc Network (MANET) is a collection of wireless mobile hosts without fixed network infrastructure and centralized administration.
More informationAn Efficient Approach against Rushing Attack in MANET
An Efficient Approach against Rushing Attack in MANET Ankita Rathore 1, Dr. Rajiv Srivastava 2 M.Tech. Scholar, Department of Computer Science,SIRT-E, RGPV Bhopal, MP 462033,India 1 Director, SIRT-E BHOPAL,MP
More informationA Review on Black Hole Attack in MANET
A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,
More informationAn Improvement to Mobile Network using Data Mining Approach
An Improvement to Mobile Network using Data Mining Approach Sumiti Dahiya M.Phil (CS) MM University, Mulana, Ambala, Haryana (India) sumitidahiya604@gmail.com Abstract Secure communication is always the
More informationPacket Estimation with CBDS Approach to secure MANET
Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,
More informationRelative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationA Comprehensive Review on Wormhole Attacks in MANET
A Comprehensive Review on Wormhole Attacks in MANET Reshmi Maulik Meghnad Saha Institute of Technology Techno India Group Kolkata, India e-mail: reshmimaulik@gmail.com Nabendu Chaki Department of Computer
More informationA Review on Mobile Ad Hoc Network Attacks with Trust Mechanism
A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance
More informationDefending Against Resource Depletion Attacks in Wireless Sensor Networks
Defending Against Resource Depletion Attacks in Wireless Sensor Networks Cauvery Raju M. Tech, CSE IInd Year, JNNCE, Shimoga Abstract: One of the major challenges wireless sensor networks face today is
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationThroughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014
More informationAn Energy Efficient Intrusion Detection System in MANET.
An Energy Efficient Intrusion Detection System in MANET. Namrata 1, Dr.Sukhvir Singh 2 1. M.Tech, Department of C.S.E, N.C College Of Engineering, Israna, Panipat. 2. Associate Professor Department of
More informationRushing Attack Prevention with modified AODV in Mobile Ad hoc Network
Rushing Attack Prevention with modified AODV in Mobile Ad hoc Network 1 Chinkit Suthar, 2 Bakul Panchal 1 Student-ME(CSE), 2 Assistant Professor 1 Comp uter Science and Engineering Department, 1 L.D. C
More informationA Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes
A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes Chetana K. Kamate, Dr. Santosh L. Deshpande Department P.G. Studies in Computer Network and Engineering,
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationPerformance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET
Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET Ekta Barkhodia 1, Parulpreet Singh 2, Gurleen Kaur Walia 3 Lovely Professional University, Phagwara, India ektab0@gmail.com,
More informationKeywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various
More informationA Review On: Detection and Prevention of Wormhole Attacks in MANET
International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013 1 A Review On: Detection and Prevention of Wormhole Attacks in MANET Yashpalsinh Gohil, Sumegha Sakhreliya,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A REVIEW ON BLACK HOLE ATTACK IN MULTIPATH ROUTING WIRELESS SENSOR NETWORK MR.
More informationA survey on AODV routing protocol for AD-HOC Network
A survey on AODV routing protocol for AD-HOC Network Parveen Kumar Jatin Sharma Kriti saini Astt. Professor Research fellow Research fellow Dept. of Computer Science Dept. of Computer Science Dept. of
More informationMitigating Superfluous Flooding of Control Packets MANET
Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:
More informationIJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT
A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically
More informationIndex terms Wireless Mesh networks, Selective forwarding attacks, Route Reply Packet, Fuzzy Logic, Detection threshold.
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Fuzzy Logic
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationEvaluation of Routing Protocols for Mobile Ad hoc Networks
International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network
More informationSelective Forwarding Attacks Detection in WSNs
Selective Forwarding Attacks Detection in WSNs Naser M. Alajmi and Khaled M. Elleithy Computer Science and Engineering Department, University of Bridgeport, Bridgeport, CT, USA nalajmi@my.bridgeport.edu,
More informationK. R. Viswa Jhananie et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (6), 2015,
Precheck Algorithm with Success Rate Table in Handshake for Detecting and Removing Gray and Black Hole Attack in MANET K. R. Viswa Jhananie 1, Dr. C. Chandrasekar 2 1 Department of Computer Science, Sheshadripuram
More informationPerformance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack
Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)
More informationSTUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK
STUDY AND COMPARISION OF PROACTIVE AND REACTIVE ROUTING PROTOCOL FOR MULTICHANNEL WIRELESS AD-HOC NETWORK 1 Arpita Singh, 2 Navendu Nitin, 3 Neelesh Agrawal, 4 Arvind Kumar Jaiswal 1 PG student, SHIATS-DU,
More informationPerformance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance
More informationALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationA Novel Secure Routing Protocol for MANETs
22 A Novel Secure Routing Protocol for MANETs Zhongwei Zhang University of Southern Queensland Australia 1. Introduction Ad hoc networks is a special kind of wireless network mode. A mobile ad hoc network
More informationAn Analysis and Prevention of Routing Attacks in Mobile Adhoc Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationEvaluation of Communication Overheads in Wireless Sensor Networks
Evaluation of Communication Overheads in Wireless Sensor Networks Shiv Prasad Kori 1, Dr. R. K. Baghel 2 1 Deptt. of ECE, JIJA Mata Govt. Women Polytechnic College, Burhanpur (MP)- INDIA 2 Electronics
More informationA SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS
A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationPerformance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Comparison of DSDV, AODV, DSR, Routing protocols
More informationOptimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol
More informationWormhole Attack Detection in Wireless Senor Networks
ABSTRACT 2018 IJSRST Volume 4 Issue 2 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology Wormhole Attack Detection in Wireless Senor Networks Harkesh Sehrawat, Yudhvir
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationPerformance of QoS Parameter in Wireless Ad hoc Network (IEEE b)
Performance of QoS Parameter in Wireless Ad hoc Network (IEEE 802.11b) Kumar Manoj, Parmanand, S. C. Sharma & S.P. Singh Abstract A wireless Ad-hoc network consists of wireless nodes communicating without
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationTechnology, Andheri (w), Mumbai, India. 2 Assistant Professor, Department of Electronic & Telecommunication, Rajiv Gandhi Institute of
VAMPIRE ATTACKS PREVENTION IN WIRELESS SENSOR NETWORK VISHAL LOKHANDE [1], SANJAY D. DESHMUKH [2], SURENDRA T. SUTAR [3] 1 PG Scholar, Department of Electronic & Telecommunication, Rajiv Gandhi Institute
More informationImplementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
More informationSurvey on Attacks in Routing Protocols In Mobile Ad-Hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,
More informationEnsuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks
Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,
More informationCAODV Free Blackhole Attack in Ad Hoc Networks
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore CAODV Free Blackhole Attack in Ad Hoc Networks Watchara Saetang
More informationAN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS
AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS Pardeep Saini* Computer sci. & engg. & YIET Ravinder Chouhan Computer sci.engg. & YIET Abstract - An adhoc network is a collection of
More informationA Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan
More informationPerformance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET
Performance Analysis of DYMO Routing Protocol under Wormhole Attack in MANET Sanghita Deka, Department of CSE, ManavRachna International University Faridabad, India Madhumita Khaturia, Department of CSE,
More informationDr. Anuj Kumar Sharma 2 Associate professor (CSE) Department of Computer Science and Engineering
ISSN: 2321-7782 (Online) Impact Factor: 6.047 Volume 4, Issue 8, August 2016 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case
More information[Wagh*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETECTION OF BLACK HOLE ATTACK USING CONTACT-BASED WATCHDOG Prashantkumar Wagh*, Amutha Jayakumar Department of Electrical Engineering,Veermata
More informationA Novel Scheme for Detection and Elimination of Blackhole/Grayhole Attack in Manets
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationA Review Paper on Secure Routing Technique for MANETs
A Review Paper on Secure Routing Technique for MANETs Sonali Sharma 1, Simranjit Kaur 2 1M.Tech student, Dept. of Electronics & Communication Engineering, Sri Sai College of Engineering and Technology(Badhani),
More information