CFP last date
20 January 2025
Reseach Article

Article:Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network

by D. Kothandaraman, A. Amuthan, Dr. C. Chellappan, Dr. N. Sreenath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Number 8
Year of Publication: 2010
Authors: D. Kothandaraman, A. Amuthan, Dr. C. Chellappan, Dr. N. Sreenath
10.5120/1695-2065

D. Kothandaraman, A. Amuthan, Dr. C. Chellappan, Dr. N. Sreenath . Article:Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network. International Journal of Computer Applications. 12, 8 ( December 2010), 34-39. DOI=10.5120/1695-2065

@article{ 10.5120/1695-2065,
author = { D. Kothandaraman, A. Amuthan, Dr. C. Chellappan, Dr. N. Sreenath },
title = { Article:Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2010 },
volume = { 12 },
number = { 8 },
month = { December },
year = { 2010 },
issn = { 0975-8887 },
pages = { 34-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume12/number8/1695-2065/ },
doi = { 10.5120/1695-2065 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:10.138374+05:30
%A D. Kothandaraman
%A A. Amuthan
%A Dr. C. Chellappan
%A Dr. N. Sreenath
%T Article:Prevention of Wormhole and Rushing Attack on Location- based Geocasting and Forwarding Routing Protocol in Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 12
%N 8
%P 34-39
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper objective is to prevent possible types of routing attacks are wormhole and rushing attack on location- based geocasting and forwarding (LGF) routing protocol in Mobile Ad-hoc Network (MANET). The LGF protocol has proposed to the implemented in real MANET test bed that integration by Global Positioning System (GPS)-free covered location tracking system with Geocast-enhanced Ad-hoc On-Demand Distance Vector (GAODV). In addition wormhole and rushing attack will be generating the prevention techniques in LGF protocol and also find the impact of attacks to overcome the potential solutions. Simulation of LGF protocol and attacks has been work done by GloMoSim-2.03 network simulator.

References
  1. Luo Junhai, Ye Danxia, Xue Liu and Mingyu, “A Survey of Multicast Routing Protocols for Mobile Ad-Hoc Networks”, IEEE Communications Surveys & Tutorials, vol. 11 No. 1,First Quarter 2009.
  2. L.A.Latiff, AAli1, chia-ching,Ooi2, N.Fisal3, “Location- based Geocasting and Forwarding (LGF) Routing Protocol Mobile Ad hoc Network”, Telecommunications, 2005. Advanced industrial conference on telecommunications/service assurance with partial and intermittent resources conference/e-learning on telecommunications workshop. Aict/sapir/elete2005. Proceedings on 17-20 July 2005.
  3. Shalini Jain, Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile ad-hoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010.
  4. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, “A Survey Of Routing Attacks In Mobile Ad Hoc Networks”, Wireless Communications IEEE, volume :14, issues:5, 2007.
  5. V. Palanisamy, P.Annadurai, “ Impact of Rushing attack on Multicast in Mobile Ad Hoc Network”, (IJCSIS) International Journal of Computer Science and Information Security,Vol. 4, No. 1 & 2, 2009.
  6. Jorge Nuevo, “A Comprehensible Glomosim Tutorial”, INRS.
  7. Hoang Lan Nguyen and Uyen Trang Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks”, Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06).
  8. Garcia- Luna - Aceves and E. Madruga, “The Core Assisted Mesh Protocol”, IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, 1999.
  9. Saman Desilva, Rajendra V. Boppana, “Mitigating Malicious Control Packet Floods in Ad Hoc Networks”, IEEE Communications Society/WCNC 2005
  10. G.S. Mamatha and Dr. S. C. Sharma, “A Highly Secured Approach against Attacks in MANETS”, International Journal of Computer Theory and Engineering, Vol. 2, No. 5, October, 2010.
  11. Li Shi-Chang, Yang Hao-Lan, Zhu Qing-Sheng, “Research on MANET Security Architecture Design”, Signal Acquisition and Processing, 2010. ICSAP '10. International Conference on, 10.1109/ICSAP, 2010.19, Page(s): 90 – 93.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole attack Rushing attack LGF Geocast-enhanced (GAODV) Mobile Ad-hoc Network (MANET) IN-Intermediate Node Source S Destination D