Immuning Routing Protocols from the Wormhole Attack
|
|
- Juliet Snow
- 6 years ago
- Views:
Transcription
1 9 Fourth International Conference on Systems and Networks Communications Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks Marianne A. Azer Computer Dept. National Telecommunication Institute Cairo, Egypt Sherif M. El-Kassas Computer Science Dept. American University in Cairo Cairo, Egypt Magdy S. El-Soudani Electronics and Communications Dept. Cairo University, Faculty of Engineering Cairo, Egypt Abstract Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper, we propose a scheme for the wormhole attack prevention in ad hoc networks. The scheme relies on the idea that usually the wormhole nodes participate in the routing in a repeated way as they attract most of the traffic. Therefore, each node will be assigned a cost depending in its participation in routing. The cost function is chosen to be exponential in powers of two such that to rapidly increase the cost of already used nodes. Besides preventing the network from the wormhole attack, the scheme provides a load balance among nodes to avoid exhausting nodes that are always cooperative in routing. In addition, a better network performance has been achieved in terms of traffic. Keywords- Ad Hoc Network; attacks; routing; security; wormhole attack. I. INTRODUCTION A wireless ad-hoc network consists of a collection of autonomous peer mobile nodes that self-configure to form a network and have no pre-determined organization of available links. The broadcast nature of the radio channel introduces characteristics in ad hoc wireless networks that are not present in their wired counterparts. Ad hoc networks are vulnerable to attacks due to many reasons; amongst them are the absence of infrastructure, wireless links between nodes, limited physical Protection, the Lack of a centralized monitoring or management, and the resource constraints. One of the most famous attacks on this type of networks is the wormhole attack. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper we suggest a scheme to prevent this attack based on its effects. The remainder of this paper is organized a follows. In section II, we explain briefly the Ad Hoc on Demand Distance Vector (AODV) protocol used for routing in ad hoc networks, the wormhole attack and the effort done in the literature to combat this attack. In section III, we present our proposed scheme. Simulation results are presented in section IV and finally, conclusions and future work are given in section V. II. BACKGROUND In this section we give a brief overview on the Ad Hoc on Demand Distance Vector (AODV) routing protocol in section A and the wormhole attack description and proposed solutions in section B. A. The Ad Hoc on Demand Distance Vector Routing Protocol The AODV [] builds and maintains routes between nodes only as needed by source nodes. When a source node desires a route to a destination for which it does not already have a route it broadcasts a RREQ packet across the network. Nodes receiving this packet update their information for the source node and set up backwards pointers to the source node in the route tables. In addition to the source node's IP address, current sequence number, and broadcast ID, the RREQ also contains the most recent sequence number for the destination of which the source node is aware. A node receiving the RREQ may send a RREP if it is either the destination or if it has a route to the destination with corresponding sequence number greater than or equal to that contained in the RREQ. If this is the case, it unicasts a RREP back to the source. Otherwise, it rebroadcasts the RREQ. Nodes keep track of the RREQ's source IP address and broadcast ID. If they receive a RREQ, which they have already processed, they discard the RREQ and do not forward it. As the RREP propagates back to the source, nodes set up forward pointers to the destination. Once the source node receives the RREP, it may begin to forward data packets to the destination. If the source later receives a RREP containing a greater sequence number or contains the same sequence number with a smaller hop count, it may update its routing information for that destination and begin using the better route. As long as the route remains active, it will continue to be maintained /9 $26. 9 IEEE DOI.9/ICSNC.9.6 3
2 A route is considered active as long as there are data packets periodically traveling from the source to the destination along that path. Once the source stops sending data packets, the links will time out and eventually be deleted from the intermediate node routing tables. If a link break occurs while the route is active, the node upstream of the break propagates a route error (RERR) message to the source node to inform it of the now unreachable destination(s). After receiving the RERR, if the source node still desires the route, it can reinitiate route discovery. B. The Wormhole Attack A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks [2], [3], [4]. During the attack [5] a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. The tunnel can be established in many different ways, such as through an out-of-band hidden channel (e.g., a wired link), packet encapsulation, or high powered transmission. This tunnel makes the tunneled packet arrive either sooner or with less number of hops compared to the packets transmitted over normal multihop routes. This creates the illusion that the two end points of the tunnel are very close to each other. A wormhole tunnel can actually be useful if used for forwarding all the packets. However, in its malicious incarnation, it is used by attacking nodes to subvert the correct operation of ad-hoc and sensor network routing protocols. The two malicious end points of the tunnel may use it to pass routing traffic to attract routes through them. They can then launch a variety of attacks against the data traffic flowing on the wormhole, such as selectively dropping the data packets. The wormhole attack can affect network routing, data aggregation and clustering protocols, and location-based wireless security systems. Finally, it is worth noting that the wormhole attack can be launched even without having access to any cryptographic keys or compromising any legitimate node in the network. Several solutions have been proposed in the literature for the wormhole attack, the solutions can be categorized into location-based and time-based solutions such as in [3], [4], [6], [7], [8], [9], [], [], key-based solutions as in [2], [3], statistical solutions such as in [4], [5], graph-based solutions as in [6], [7], [8], [9] and finally neighbor monitoring-based solutions [9], [2], [2], [22]. The added burden of location identification, time synchronization, attack graph automatic formation, make the solutions that rely on them complex and in most of the time consume a lot of the limited nodes resources. III. WORMHOLE PREVENTION SCHEME In this section we present pour proposed wormhole attack prevention scheme. The basic idea that lies behind the wormhole attack is that the wormhole malicious nodes pull the traffic by advertizing short paths, with minimum number of hops. It is therefore more likely possible to have those wormhole routes participate in routing packets. From this perspective, we suggest the modification of the AODV protocol in such a way to disable the malicious nodes to attract the traffic all the time and be able to process it maliciously. Hence, each node will be assigned a cost depending on its contributions in routing using the following cost function. c(i) new = 2 n + c(i) old where c(i) is the cost of a node i, initially c(i)=. n is the number of times a node has contributed in routing to a certain destination, initially n =. This function takes into consideration the number of times a node has participated in routing for a certain source and the node s cost will be increased accordingly. In order to apply our approach other additional features should be added /modified in the default AODV protocol. One concerns the RREQs, the other concerns the added cost function. To start with, it was mentioned earlier in the default AODV protocol description that if a node receives a RREQ, which it has already processed, it discards the RREQ and does not forward it. This step should be modified as we need to have multiple options of routing paths for the same request originated by the source. It follows that a node should process all arrived RREQs forwarded to it by different previous hops. A new cost field should be added to the RREQs and RREPs (signaling packets), and to the nodes routing tables as well. Now if a source node needs a route to the destination, it broadcasts the RREQ packets, which will be now processed differently at intermediate nodes, and a hop by hop decision is made. The following algorithm and flow chart shown in Figure describe this hop-based decision. - A signaling packet (RREQ/RREP) is received by node (X) from Node (N) looking for a path for destination (D). 2- Node (X) extracts target (S/D) from signaling packet (If the signaling packet is a RREQ then the target is the source, if the signaling packet is a RREP, then the target is the Destination). 3- Node (X) searches in routing table for another node (O) having a fresh route to the target. 4- If the node (O) is not found or if the route is not fresh enough, an entry for the target node is added to the routing table of node (X) 5- If the node (O) is found in the routing table, and has a route to the target the following should be verified: i- How many times node (X) has used node (O) as a next hop (R ) ii- How many times node (X) has used node (N) as a next hop (R 2 ) iii- Compare R and R 2 iv- Update the routing table v- Add node (X) s cost to the signaling packet and forward it to the target node. 3
3 6- Target node (S/D) receives the coming signaling packet calculates the final cost and compares with its routing table to select the route with minimum cost. Figure Flow Chart of suggested Wormhole Prevention Scheme IV. SIMULATION RESULTS We have chosen to use the OPNET modeler since this simulator includes lots of facilities for ad hoc networks such as defining protocol packet format, defining the state transition machine for processes running the protocol, defining process modules and transceiver modules we need in each device node, defining the network model by connecting the device nodes together using user-defined link models, and above all programming and implementing new functions. We have used some of these facilities to modify the AODV protocol in OPNET. Simulations were done for default and customized AODV protocol to test the effect of assigned cost due to the repeated use of nodes in routing in the presence of tempting existing paths with minimum number of hops. The number of nodes is 35 distributed randomly on an area of 3.5by 3.5 kilometers, all using the AODV protocol. The AODV protocol parameters are shown in Table. TABLE I. SIMULATION PARAMETERS AODV Parameter Settings Route Request Retries 5 Route Request Rate Limit (Packets/second) Active Route Timeout 3 (Seconds) Hello Interval (Seconds) Uniform (,.) Allowed Hello Loss Net Diameter (The 35 maximum possible number of hops between two nodes in the network) Node Traversal Time.4 (Seconds) Route Error Limit (Packets/sec) 32
4 Time To Live Threshold Local Repair Enabled Addressing Mode IPv4 lack of space we shall only present two windows that represent two rounds for each cost function in Figures 4, 5, 6, and 7. First, simulations have run for this network using the default AODV protocol in the absence and in the presence of a wormhole attack. The change in routing is illustrated by Figure 2 and Figure 3 respectively. The malicious colluding nodes have been chosen to be node 9 and node 2, that is why the traffic has changed its regular minimum hop path as the wormhole path appears to have five hops, while normally the minimum hop path in this network has six hops. In the path details window, the hops used for routing are mentioned to make sure the wormhole path bypasses node 2 although it seems to use it from the first look. Node 9 Node 2 Figure 4 Path details using the custom AODV protocol with a linear cost function under wormhoe attack by nodes 9 and 2, second round Figure 2 Routing and path details using the default AODV protocol Node 9 Node 2 Figure 5 Path details using the custom AODV protocol with a linear cost function under wormhoe attack by nodes 9 and 2, third round Node 9 Node 2 Figure 3 Routing and path details using the default AODV protocol under wormhoe attack by nodes 9 and 2 The next step was then to run simulations under wormhole attack using our custom AODV protocol that uses cost. We have run the simulations using two types of costs, a linear cost and the exponential cost mentioned in section III. The routing and chosen paths details have changed due to the use of the cost functions. The first window for each custom AODV protocol is the same as Figure 3, because at the beginning all nodes costs are equal, so the custom protocol performs similarly to the default AODV protocol. For the Node 9 Node 2 Figure 6 Path details using the custom AODV protocol with exponential cost function under wormhoe attack by nodes 9 and 2, second round 33
5 Node 9 Node 2 Figure 7 Path details using the custom AODV protocol with exponential cost function under wormhoe attack by nodes 9 and 2, third round To compare the performance of the two cost functions and evaluate the custom AODV protocol, we use the delay at the destination and the traffic sent and received by malicious nodes as a measure. From Figure 8, we notice that the average delay at destination has decreased when the default AODV protocol was used under the wormhole attack. The delay has slightly increased when our custom schemes were used. We also notice that the average delay of the custom protocol is the same using both cost functions. In Figures 9,,, and 2, we present the change in the average traffic sent and received by malicious nodes 9 and 2 respectively. We notice that our suggested scheme has contributed in a significant decrease in the traffic sent by the malicious nodes. We also notice that the exponential cost function has slightly a better performance than the linear one E 7.5 aodv_defaullt 4 wormhole DES : Campus Network.destination.MANET.Delay (secs) aodv_defaullt 4-DES-: Campus Network.destination.MANET.Delay (secs) Average Delay using a linear cost function (secs) Average delay using an exponential cost function (secs) Figure 8 Comapring average delay at destination aodv_defaullt wormhole: node9.aodv.routing Traffic Sent (bits/sec) Average Traffic sent by node 9 using a linear cost function (bits/sec) Average Traffic sent by node 9 using an exponential cost function (bits/sec) Figure 9 Comapring average traffic sent by node 9
6 aodv_defaullt wormhole: node9.aodv.routing Traffic Received (bits/sec) Average Traffic received by malicious node 9 using linear cost function(bits/sec) Average Traffic received by malicious node 9 using exponential cost function(bits/sec) Figure Comapring average traffic received by node manet_internals aodv_defaullt 4 wormhole DES : Campus Network.node2.AODV.Routing Traffic Sent (bits/sec) Average traffic sent by node 2 using linear cost function (bits/sec) Average traffic sent by node 2 using exponential cost function (bits/sec) Figure Comapring average araffic sent by node aodv_defaullt wormhole: Campus Network.node2.AODV.Routing Traffic Received (bits/sec) Average traffic received by node 2 using linear cost function (bits/sec) Average traffic received by node 2 using an exponential cost function (bits/sec) Figure 2 Comapring average traffic received by node 2 V. CONCLUSIONS AND FUTURE WORK Throughout this paper, we introduced the wormhole attack and the effort that has been done in the literature either to prevent, or to detect this attack, we have also explained briefly the AODV protocol used in the ad hoc networks for routing. To immune the network from the wormhole attack, we suggested the modification of the AODV protocol in such 35
7 a way to disable the malicious nodes from attracting the traffic all the time and be able to process it maliciously. The idea relies basically on assigning cost to the nodes that participate in routing packets for a certain source. A node that has been used more than once has its cost increased either linearly or exponentially (power of two), this is to ensure that a tempting path that offers apparently small number of hops will have a high cost because it contains a node that was used before. By this, the attractive wormhole node will not be able to attract the traffic all the time as there cost will increase very fastly. The suggested method uses the cost function to compare, at every node receiving a control message, between a next hop offering a route to the destination and nodes in its routing table also having routes to the destination. In addition to immuning the network from the wormhole attack, and minimizing the traffic sent by malicious nodes, this solution has the privilege of providing a load balance in the ad hoc networks, which saves regular nodes from resource consumption if they repeatedly participate in routing. Other attractive features of this scheme are simplicity, the scheme also benefits from being totally decentralized, which is more suitable to the distributed nature of ad hoc networks and finally, there are no resource requirements, except for a single extra field in the entry of nodes routing tables. Results have also shown that the penalty paid for these advantages was a slight increase in the delay compared to the delay achieved using the default AODV protocol in the absence of the wormhole attack. We plan to modify this scheme such as to take the number of hops into consideration while calculating the nodes costs, as this might lead to a decrease in the delay. We could thus obtain an optimum scheme with the minimum hop repetition and hop count. The new suggested scheme performance will also be compared to other wormhole prevention schemes proposed in the literature. REFERENCES [] C. E. Perkins and E. M. Royer. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley,, pp [2] C. Karlof and D. Wagner, Secure Routing in Sensor Networks: Attacks and Countermeasures, in the st IEEE International Workshop on Sensor Network Protocols and Applications, May, 3. [3] Y. C. Hu, A. Perrig, and D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp , 3. [4] L. Hu and D. Evans, Using Directional Antennas to Prevent Wormhole Attacks, Network and Distributed System Security Symposium (NDSS), San Diego, Feb 4. [5] I. Khalil, S.Bagchi, N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks", dsn, pp , 5 International Conference on Dependable Systems and Networks (DSN'5), 5. [6] S. Capkun, L. Buttyan, and J. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.- 2, Washington,USA, Oct 3. [7] W. Ribeiro, P. Junior, T. Figueiredo, H. Wong, and A. Loureiro. "Malicious Node Detection in Wireless Sensor Networks", ipdps, p. 24b, 8th International Parallel and Distributed Processing Symposium (IPDPS'4) - Papers, 4. [8] X. Wang, "Intrusion Detection Techniques in Wireless Ad Hoc Networks", compsac, pp. 7-9, 3th Annual International Computer Software and Applications Conference (COMPSAC'6), 6. [9] X. Wang, and J. Wong, "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks," compsac, pp , 3st Annual International Computer Software and Applications Conference - Vol. - (COMPSAC 7), 7. [] F. Naït-Abdesselam, B. Bensaou, and T. Taleb, "Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Networks," in IEEE Communications Magazine. vol. 46, April 8, pp [] S. Khurana and N. Gupta, "FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks," in Second International Conference on Emerging Security Information, Systems and Technologies, secureware, 8, pp [2] Y. Zhang, W. Liu, W. Lou and Y. Fang Securing Sensor Networks with Location-Based Keys, WCNC 5 - IEEE Wireless Communications and Networking Conference, no., March 5, pp [3] R. Poovendran, L., Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, in Wireless Networks, Volume 3, Issue, ISSN:22-38, pp , 7. [4] N. Song, L. Qian, and X. Li. "Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach", ipdps, p. 289a, 9th IEEE International Parallel and Distributed Processing Symposium (IPDPS'5) - Workshop 7, 5. [5] L. Buttyan, L. Dora, and I. Vajda, Statistical wormhole detection in sensor networks, Hungary, July 5. [6] W. Wang and B. Bhargava, Visulization of wormholes in sensor networks, Proceeding of the ACMWorkshop onwireless Security (WiSe), pages 5 6, 4. [7] M. Azer, S. El-Kassas,and M. El-Soudani, Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection,, SECRYPT 6, pp [8] R. Maheshwari, J. Gao, and S. R. Das, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information," in INFOCOM 7. 26th IEEE International Conference on Computer Communications. IEEE, 7, pp [9] C. Sun, K. Doo-young, L.Do-hyeon, and J. Jae-il, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks," in Proceedings of the 8 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 8), June 8, pp [2] K. Win, "Analysis of Detecting Wormhole Attack in Wireless Networks," in Proceedings of World Academy of Science, Engineering and Technology, Volume 36, December 8, ISSN [2] F. KONG, C. LI, Q.DING, G. CUI, and B. CUI, "WAPN: A Distributed Wormhole Attack Detection Approach for Wireless Sensor Networks," Journal of Zhejiang University SCIENCE A, vol., p. 279~289, February 9. [22] L. Gunhee, S. Jungtaek, and K. Dong-kyoo ", An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks," in Proceedings of the 8 International Conference on Information Security and Assurance (ISA 8), 8, pp
A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks Marianne Azer Computer Dept. National Telecommunication Institute Cairo, Egypt marazer@nti.sci.eg
More informationA Pigeon Agents based Analytical Model to Optimize Communication in Delay Tolerant Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1029
More informationDetection of Wormhole Attacks in Wireless Sensor Networks
Detection of Wormhole Attacks in Wireless Sensor Networks Ms Shweta Dalke RGPV: Electronics & Communication,Truba College of Engineering & Technology,Indore,INDIA Ms Pallavi Pahadiya RGPV: Electronics
More informationWAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks
2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks Sun Choi, Doo-young Kim, Do-hyeon Lee, Jae-il
More informationRound Trip Time based Wormhole Attacks Detection
Round Trip Time based Wormhole Attacks Detection Zaw Tun and Ni Lar Thein University of Computer Studies, Yangon zawtun78 @gmail.com, nilarthein@gmail.com Abstract The nature of wireless ad hoc and sensor
More informationAnalysis of Worm-Hole Attack in MANET using AODV Routing Protocol
Analysis of Worm-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary, Dr Sudhir Agrawal Truba College of Engineering & Technology, Indore, INDIA Abstract MANET is an infrastructure less, dynamic,
More informationE2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks
2012 26th International Conference on Advanced Information Networking and Applications Workshops E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks Sanjay Kumar Dhurandher
More informationA REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department
More informationLink-Based Wormhole Detection in Wireless Sensor Networks
Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,
More informationBlackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine
International Journal of Wireless Communications, Networking and Mobile Computing 2016; 3(5): 48-52 http://www.aascit.org/journal/wcnmc ISSN: 2381-1137 (Print); ISSN: 2381-1145 (Online) Blackhole Attack
More informationPerformance Analysis of Aodv Protocol under Black Hole Attack
International Journal of Scientific & Engineering Research Volume 2, Issue 8,August-2011 1 Performance Analysis of Aodv Protocol under Black Hole Attack Monika Roopak, Dr. Bvr Reddy ABSTRACT- Mobile Ad-hoc
More informationA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD- HOC NETWORKS Subhashis Banerjee 1 and Koushik Majumder 2 1 Department of Computer Science & Engineering, West Bengal University of Technology,
More informationWormhole Attack in Wireless Ad-Hoc Networks
Wormhole Attack in Wireless Ad-Hoc Networks Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour Abstract Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack,
More informationPerformance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi 1 Assistant Professor, 1, 2, 3 Department of IT 1, 2, 3
International Journals of Advanced Research in Computer Science and Software Engineering Research Article June 2017 Performance Analysis of AODV under Worm Hole Attack 1 S. Rama Devi, 2 K.Mamini, 3 Y.Bhargavi
More informationFigure 1: Ad-Hoc routing protocols.
Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca
More informationA COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE
Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE
More informationAvailable online at ScienceDirect. Procedia Computer Science 56 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 56 (2015 ) 384 390 International Workshop on Cyber Security and Digital Investigation (CSDI 2015) Analysis of Detection
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 3.134 ISSN (Online): 2348-4470 ISSN (Print) : 2348-6406 International Journal of Advance Engineering and Research Development Volume 1, Issue 11, November -2014
More informationSecurity Issues In Mobile Ad hoc Network Routing Protocols
Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be
More informationA DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM
A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM Ms. Nivethitha N, Mr. NandhaKumar S, Ms. Meenadevi M Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering
More informationAODV-PA: AODV with Path Accumulation
-PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications
More informationQoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar
More informationPerformance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack
Performance Analysis of Mobile Ad Hoc Network in the Presence of Wormhole Attack F. Anne Jenefer & D. Vydeki E-mail : annejenefer@gmail.com, vydeki.d@srmeaswari.ac.in Abstract Mobile Ad-Hoc Network (MANET)
More informationWormhole Detection and Prevention in MANET: A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.980
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationA Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks
A Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks Sushant S. Bahekar 1, Prashant Panse 2 1 M. Tech Student, Departemnt of Computer Engineering, SVCE, Indore,
More information1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol
1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks
More informationCAODV Free Blackhole Attack in Ad Hoc Networks
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore CAODV Free Blackhole Attack in Ad Hoc Networks Watchara Saetang
More informationA Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network
A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk
More informationPERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH
PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH 1. Prof.S.P. Setti 2. Narasimha Raju K 3. Naresh Kumar K CS&SE Dept., CS&SE Dept., CS&SE Dept., AU College of Engineering, AU College of Engineering,
More informationReview on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks
RESEARCH ARTICLE OPEN ACCESS Review on Packet Forwarding using AOMDV and LEACH Algorithm for Wireless Networks Mrs. P. V. Meghare 1, Prof. P. A. Deshmukh 2 1 Department of Computer Science, Nagpur University,
More informationOpen Research Online The Open University s repository of research publications and other research outputs
Open Research Online The Open University s repository of research publications and other research outputs Research Findings on Wormhole Attack Detection in Mobile Ad Hoc Networks Conference or Workshop
More informationDETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS
Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS Yurong Xu, Guanling Chen, James Ford and Fillia Makedon Abstract Wormhole attacks can destabilize or disable wireless sensor networks.
More informationWormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach Ning Song and Lijun Qian Department of Electrical Engineering Prairie View A&M University Prairie View, Texas 77446
More informationENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK
ENERGY-AWARE FOR DH-AODV ROUTING PROTOCOL IN WIRELESS MESH NETWORK Yousif Ali Saadi, Rosilah Hassan and Dahlila Putri Dahnil Network Communication Lab Research, Centre for Software Technology and Management
More informationPERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS
PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,
More informationDetecting and Preventing Wormhole Attacks In Wireless Sensor Networks
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 6 (Mar. - Apr. 2013), PP 19-27 Detecting and Preventing Wormhole Attacks In Wireless Sensor Networks
More informationRecent Researches in Communications, Information Science and Education
AODV Based Multi-path Local Repairing Scheme for Mobile Ad Hoc Networks Eman Shaaban, PhD Computer Systems Dept. Faculty of computer and information science Ain-Shams university, Cairo, Egypt Eman.shaaban@cis.asu.edu.eg
More informationPerformance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power
, pp.1-6 http://dx.doi.org/10.14257/ijsacs.2015.3.1.01 Performance Analysis of Wireless Mobile ad Hoc Network with Varying Transmission Power Surabhi Shrivastava, Laxmi Shrivastava and Sarita Singh Bhadauria
More informationInternational Journal of Advance Research in Engineering, Science & Technology. A Survey on Wormhole Attack in MANET
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 A Survey on Wormhole Attack
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS
ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo
More informationEnergy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks
Received: February 9, 207 55 Energy Efficient Intrusion Detection System for ZigBee based Wireless Sensor Networks Jegan Govindasamy * Samundiswary Punniakodi Department of Electronics Engineering Pondicherry
More information6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationOVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS
OVERCOME VAMPIRE ATTACKS PROBLEM IN WIRELESS AD-HOC SENSOR NETWORK BY USING DISTANCE VECTOR PROTOCOLS 1 G. Vijayanand, 2 R. Muralidharan 1 Assistant Professor, Dept. of Computer Science & Engineering,
More informationKeywords Wormhole Attack, AODV, Multipath Algorithm, On Demand Routing Protocols, Route Request, Route Reply, Mobile Ad-hoc Network,
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Optimized
More informationWhite Paper. Mobile Ad hoc Networking (MANET) with AODV. Revision 1.0
White Paper Mobile Ad hoc Networking (MANET) with AODV Revision 1.0 This page is intentionally blank, or rather nearly blank. Table of Contents TABLE OF CONTENTS...3 TABLE OF FIGURES...4 WHAT IS MANET?...5
More informationAn Efficient Approach against Rushing Attack in MANET
An Efficient Approach against Rushing Attack in MANET Ankita Rathore 1, Dr. Rajiv Srivastava 2 M.Tech. Scholar, Department of Computer Science,SIRT-E, RGPV Bhopal, MP 462033,India 1 Director, SIRT-E BHOPAL,MP
More informationMobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1
Mobile Ad-hoc and Sensor Networks Lesson 04 Mobile Ad-hoc Network (MANET) Routing Algorithms Part 1 Oxford University Press 2007. All rights reserved. 1 Ad-hoc networks deployment For routing, target detection,
More informationConsiderable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)
Editorial imedpub Journals http://www.imedpub.com/ American Journal of Computer Science and Information Technology DOI: 10.21767/2349-3917.100025 Considerable Detection of Black Hole Attack and Analyzing
More informationPerformance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks
, pp.63-70 http://dx.doi.org/10.14257/ijast.2015.82.06 Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks Kulbir Kaur Waraich 1 and Barinderpal Singh
More informationDefenses against Wormhole Attack
Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes
More informationAnalysis of Black-Hole Attack in MANET using AODV Routing Protocol
Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication
More informationMs A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India.
Dynamic Training Intrusion Detection Scheme for Blackhole Attack in MANETs Ms A.Naveena Electronics and Telematics department, GNITS, Hyderabad, India. Dr. K.Rama Linga Reddy Electronics and Telematics
More informationA New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks
Contemporary Engineering Sciences, Vol. 8, 2015, no. 19, 859-864 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.57207 A New Energy-Aware Routing Protocol for Improving Path Stability
More informationPerformance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)
Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University
More informationPower aware Multi-path Routing Protocol for MANETS
Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile
More informationANewRoutingProtocolinAdHocNetworks with Unidirectional Links
ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationRelative Performance Analysis of Reactive (on-demand-driven) Routing Protocols
Relative Performance Analysis of Reactive (on-demand-driven) Routing Protocols Mukesh Kumar Garg, Dr. Ela Kumar Abstract A Mobile Ad Hoc Network (MANET) is a group of wireless mobile computers (or nodes);
More informationWormhole Attack Detection Protocol using Time Stamp with Security Packet.
Wormhole Attack Detection Protocol using Time Stamp with Security Packet. Chandraprabha Rawat Department of Computer Application Samrat Ashok Technological Institute Vidisha, India. Abstract- The Mobile
More informationRouting in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14
Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path
More informationIJRIM Volume 1, Issue 4 (August, 2011) (ISSN ) A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS ABSTRACT
A SURVEY ON BEHAVIOUR OF BLACKHOLE IN MANETS Pinki Tanwar * Shweta** ABSTRACT A mobile adhoc network is a collection of mobile nodes which form a network which is not fixed. The nodes in the network dynamically
More informationAn Improved DV-Hop Algorithm for Resisting Wormhole Attack
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 3, Issue 4, July 2014
Vampire Attack Detection in Wireless Sensor Network Jose Anand 1, K. Sivachandar 2 1. Associate Professor, 2. Assistant Professor Department of Electronics and Communication Engineering, K.C.G. College
More informationAn Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET
An Extensive Simulation Analysis of AODV Protocol with IEEE 802.11 MAC for Chain Topology in MANET V.K.Taksande 1, Dr.K.D.Kulat 2 1 Department of Electronics & Communication, Nagpur University Priyadarshini
More informationEffects of Caching on the Performance of DSR Protocol
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 07-11 Effects of Caching on the Performance of DSR Protocol Narinderjeet Kaur 1, Maninder
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #11 - Identity Mgmt.; Routing Security 2016 Patrick Tague 1 Class #11 Identity threats and countermeasures Basics of routing in ad hoc networks
More informationPrevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing
Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based
More informationPerformance of Ad-Hoc Network Routing Protocols in Different Network Sizes
Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co
More informationA Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks
A Study of Deploying Intrusion Detection Systems in Mobile Ad Hoc Networks Ming-Yang Su Abstract This paper presents an approach to prevent attacks in MANETs by deploying intrusion detection nodes. Some
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationWormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure Majid Khabbazian, Hugues Mercier and Vijay K. Bhargava Department of Electrical and Computer Engineering University of British Columbia
More informationEvaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network
Evaluating the Performance of Mobile Agent-Based Communication among Mobile Hosts in Large Ad Hoc Wireless Network S. Bandyopadhyay Krishna Paul PricewaterhouseCoopers Limited Techna Digital Systems Sector
More informationWebpage: Volume 4, Issue VI, June 2016 ISSN
SECURE DYNAMIC SOURCE ROUTING IN MOBILE ADHOC NETWORKS Pooja Sharma 1, Seep Sethi 2 1 M.Tech (ECE), 2 Head of ECE Department Somany (PG) Institute of Technology & Management, Rewari Abstract: A mobile
More information[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor
[Nitnaware *, 5(11): November 218] ISSN 2348 834 DOI- 1.5281/zenodo.1495289 Impact Factor- 5.7 GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES INVESTIGATION OF DETECTION AND PREVENTION SCHEME FOR
More informationExperiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol
Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol Kalyan Kalepu, Shiv Mehra and Chansu Yu, Department of Electrical and Computer Engineering Cleveland State University 2121
More informationAn Improvement to Mobile Network using Data Mining Approach
An Improvement to Mobile Network using Data Mining Approach Sumiti Dahiya M.Phil (CS) MM University, Mulana, Ambala, Haryana (India) sumitidahiya604@gmail.com Abstract Secure communication is always the
More informationThroughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India
More informationComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network
Global Journal of researches in engineering Electrical and electronics engineering Volume 12 Issue 3 Version 1.0 March 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global
More informationRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS R. Ramesh 1 and S. Gayathri 2 1 Department of Electrical and Electronics Engineering, Anna University, India rramesh@annauniv.edu
More information2013, IJARCSSE All Rights Reserved Page 85
Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of
More informationCOMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK
COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK Nalin Gahlaut 1, Jaya sharma 2, Pankaj Kumar 3, Kaushal Kumar 4 1 Doctoral Candidate, Uttarakhand Technical University,
More informationA Highly Effective and Efficient Route Discovery & Maintenance in DSR
A Highly Effective and Efficient Route Discovery & Maintenance in DSR Shiva Prakash 1, Rajeev Kumar 2, Brijesh Nayak 3, Manindar Kumar Yadav 4 Department of Computer Science and Engineering, Madan Mohan
More informationSecurity In Multicast Mobile Ad-Hoc Networks
326 Security In Multicast Mobile Ad-Hoc Networks Mrs.N.Shanthi National Engineering College, Kovilpatti, TamilNadu, India. Summary A Mobile Ad-hoc Network (MANET) is a collection of autonomous nodes or
More informationThe Performance Evaluation of AODV & DSR (On-Demand. emand- Driven) Routing Protocols using QualNet 5.0 Simulator
IJCSN International Journal of Computer Science and Network, Vol 2, Issue 2, April 2013 29 The Performance Evaluation of AODV & DSR (On-Demand ( emand- Driven) Routing Protocols using QualNet 5.0 Simulator
More informationDetection and Prevention of Wormhole Attack in Wireless Sensor Network
Detection and Prevention of Wormhole Attack in Wireless Sensor Network Aaditya Jain 1, Shalini Sharma 2, Dr. Bala Buksh 3 1 M.Tech Scholar, Department of Computer Science & Engg., R. N. Modi Engineering
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationEffect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols
Volume 1, Issue 3, October 2013 ISSN: 2320-9984 (Online) International Journal of Modern Engineering & Management Research Website: www.ijmemr.org Effect of Variable Bit Rate Traffic Models on the Energy
More informationCERIAS Tech Report
CERIAS Tech Report 2005-90 LITEWORP: A LIGHTWEIGHT COUNTERMEASURE FOR THE WORMHOLE ATTACK IN MULTIHOP WIRELESS NETWORKS by Issa Khalil, Saurabh Bagchi, Ness B. Shroff Center for Education and Research
More informationAn Analysis and Prevention of Routing Attacks in Mobile Adhoc Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,
More informationSurvey on Attacks in Routing Protocols In Mobile Ad-Hoc Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #11 Routing and Forwarding Security 2015 Patrick Tague 1 Class #11 Basics of routing in ad hoc networks Control-plane attacks and defenses Data-plane
More informationDetection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
Journal of Network and Computer Applications ] (]]]]) ]]] ]]] www.elsevier.com/locate/jnca Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach Lijun
More informationA Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan
More informationA Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *
Wireless Sensor Network, 2013, 5, 33-40 http://dx.doi.org/10.4236/wsn.2013.53005 Published Online March 2013 (http://www.scirp.org/journal/wsn) A Secure Routing Method for Detecting False Reports and Wormhole
More informationLecture 13: Routing in multihop wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 3, Monday
Lecture 13: Routing in multihop wireless networks Mythili Vutukuru CS 653 Spring 2014 March 3, Monday Routing in multihop networks Figure out a path from source to destination. Basic techniques of routing
More informationAnil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Analysis
More informationImplementation of AODV Protocol and Detection of Malicious Nodes in MANETs
Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,
More informationA Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network
ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer
More information