CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Comparative Study of Attacks with Clustering based and Routing Protocols in MANETs

by Harmanpreet Kaur, Sunidhi Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 7
Year of Publication: 2016
Authors: Harmanpreet Kaur, Sunidhi Sharma
10.5120/ijca2016909781

Harmanpreet Kaur, Sunidhi Sharma . Comparative Study of Attacks with Clustering based and Routing Protocols in MANETs. International Journal of Computer Applications. 141, 7 ( May 2016), 33-37. DOI=10.5120/ijca2016909781

@article{ 10.5120/ijca2016909781,
author = { Harmanpreet Kaur, Sunidhi Sharma },
title = { Comparative Study of Attacks with Clustering based and Routing Protocols in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 7 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number7/24800-2016909781/ },
doi = { 10.5120/ijca2016909781 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:42:52.776318+05:30
%A Harmanpreet Kaur
%A Sunidhi Sharma
%T Comparative Study of Attacks with Clustering based and Routing Protocols in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 7
%P 33-37
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad-hoc network is a self-configuring, substructure network of mobile devices associated by wireless links. Loopholes like wireless average, lack of a secure infrastructure, dynamic topology, rapid disposition practices, and the hostile surroundings in which they may be deployed, make MANET susceptible to a wide range of security attacks and Wormhole attack is one of them. During this attack malicious node detentions packets from one location in the network, and channels them to another colluding malicious node at a detached point, which replays them locally. The protocol is an optimization of the traditional link state algorithm personalised to the supplies of a mobile wireless LAN. The key concept used in the procedure is that of multipoint relays. MPRs are selected nodes which advancing broadcast messages during the flooding process. This technique significantly reduces the message overhead as associated to a classical flooding apparatus, where every node retransmits each message when it receives the first copy of the message. In OLSR, link state information is caused only by nodes elected as MPRs. Thus, a second optimization is achieved by reducing the number of control messages flooded in the network. This paper presents a cluster based Wormhole attack prevention technique. The concept of classified clustering with a novel hierarchical 32- bit node addressing scheme is used for eluding the attacking path during the route discovery phase of the OLSR protocol, which is measured as the under lying routing protocol.

References
  1. Al Shurman, Mohammad, Seong-Moo Yoo, and Seungjin Park. "Black hole attack in mobile ad hoc networks." Proceedings of the 42nd annual southeast regional conference. ACM, 2004.
  2. Khan, Zahoor Ali, and M. Hasan Islam. "Wormhole attack: A new detection technique." Emerging Technologies (ICET), 2012 International Conference on. IEEE, 2012.
  3. Banerjee, Subhashis, and KoushikMajumder. "ANovel CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE AD-HOC NETWORKS." ICCSEA, SPPR, CSIA, WimoA–2013.
  4. Dabas, Poonam, and PrateekThakral. "A Novel Technique for the Prevention of Wormhole Attack." International Journal 3.
  5. García-Otero, Mariano, and Adrián Población-Hernández. "Detection of wormhole attacks in wireless sensor networks using range-free localization."Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2012 IEEE 17th International Workshop on. IEEE, 2012.
  6. Clausen, Thomas, et al. "Optimized link state routing protocol (OLSR)." (2003).
  7. Banerjee, Subhashis, and KoushikMajumder. "WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE."International Journal of Computer Networks & Communications 6.1 (2014): 45.
  8. Hao Yang, HaiyunLuo, Fan Ye, Songwu Lu, and Lixia Zhang, Security in Mobile Ad Hoc Network: Challenges and Solutions, IEEE wireless Commutations, February 2004.
  9. Umang S, Reddy BVR, Hoda MN (2010) Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols using Minimal Energy Consumption. IET Communications 4(17):2084–2094. doi: 10.1049/ietcom.2009.0616.
  10. Mbarushimana, Consolee, and Alireza Shahrabi. "Comparative study of reactive and proactive routing protocols performance in mobile ad hoc networks." Advanced Information Networking and Applications Workshops, 2007, AINAW'07. 21st International Conference on. Vol. 2. IEEE, 2007.
  11. Anju, J., and C. N. Sminesh. "An Improved Clustering-Based Approach for Wormhole Attack Detection in MANET." Eco-friendly Computing and Communication Systems (ICECCS), 2014 3rd International Conference on. IEEE, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Worm Hole Attack optimized link source routing Wireless Sensor Network Local Area Network Re-active and Pro-active protocols.