CFP last date
20 December 2024
Reseach Article

Improved Routing Protocol for Wormhole Isolation in MANETs

by Avinash Singh, Ram Singar Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 166 - Number 2
Year of Publication: 2017
Authors: Avinash Singh, Ram Singar Verma
10.5120/ijca2017913915

Avinash Singh, Ram Singar Verma . Improved Routing Protocol for Wormhole Isolation in MANETs. International Journal of Computer Applications. 166, 2 ( May 2017), 1-5. DOI=10.5120/ijca2017913915

@article{ 10.5120/ijca2017913915,
author = { Avinash Singh, Ram Singar Verma },
title = { Improved Routing Protocol for Wormhole Isolation in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 166 },
number = { 2 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume166/number2/27638-2017913915/ },
doi = { 10.5120/ijca2017913915 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:34.362068+05:30
%A Avinash Singh
%A Ram Singar Verma
%T Improved Routing Protocol for Wormhole Isolation in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 166
%N 2
%P 1-5
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A wormhole advance is decidedly alarming adjoin acquisition in sensor networks in which an antagonist receives packets at one breadth aural the community, tunnels afterwards which replays them at every added far flung around central the network. A wormhole advance can be after adversity launched by way of an antagonist with out compromising any sensor nodes. if you accede that best of the acquisition protocols do not accept mechanisms to avert the arrangement appear wormhole assaults, the aisle appeal can be tunneled to the ambition abode via the antagonist through wormholes. hence, the sensor nodes aural the ambition around assemble the avenue through the attacker. Later, the antagonist can alter the statistics, messages, or selectively advanced annals letters to agitate the appearance of the sensor network. on this paintings we present a cast new way to appear beyond wormhole attacks in WSN. Our apprehension is simple and efficient. We crave neither GPS tool, nor alarm synchronization which can be the primary obstacles of the added present solutions. furthermore, our apprehension can be after problems activated agreement or in any acquaintance assay agreement for WSN. We do not acquaint any new messages. as a result, the aerial of the acknowledgment is accountable to the added abstracts (timestamps) added to the howdy messages. This apparatus can fast appear beyond a wormhole assault, afore it becomes alarming to the sufferers. Our assay additionally shows that the apprehension is authentic even in an advance accompaniment of diplomacy with worms application abnormally accelerated device. The simulations with NS-2 affirm the ability of our apprehension mechanism.

References
  1. Honglong, Chen, Wei Lou, and Zhi Wang. "Secure localization against wormhole attacks using conflicting sets." In (IPCCC), 2010 IEEE 29th International, pp. 25-33. IEEE, 2010.
  2. Xiaomeng, Ban, Jie Gao and Rik Sarkar. "Local connectivity tests to identify wormholes in wireless networks." In Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, p. 13. ACM, 2011.
  3. Dezun, Dong, Yunhao Liu, Mo Li, Xiangke Liao, and Xiang-Yang Li. "Topological detection on wormholes in wireless ad hoc and sensor networks." IEEE/ACM Transactions on Networking (TON) 19, no. 6 (2011): 1787-1796.
  4. S., Nishanthi, T. Virudhunagar. "Intrusion Detection in Wireless Sensor Networks Using Watchdog Based Clonal Selection Algorithm." (2013): 1-5.
  5. Honglong, Chen,and Wei Lou, , Zhibo Wang Junfeng Wu, Zhi Wang, and Aihua Xia. "Securing DV-Hop localization against wormhole attacks in wireless sensor networks." Pervasive and Mobile Computing 16 (2015): 22-35.
  6. Honglong, Chen, and Wei Lou, and Zhi Wang. "On providing wormhole-attack-resistant localization using conflicting sets." Wireless Communications and Mobile Computing 15, no. 15 (2015): 1865-1881.
  7. Peng Ning, Donggang, Liu An Liu, Cliff Wang, and Wenliang Kevin . "Attack-resistant location estimation in wireless sensor networks." ACM (TISSEC) 11, no. 4 (2008): 22.
  8. Honglong, Chen,and Wei Lou, Zhi Wang and Junchao Ma. "TSCD: a novel secure localization approach for wireless sensor networks." In Sensor Technologies and Applications, 2008. SENSORCOMM'08. pp. 661-666. IEEE, 2008.
  9. Wei Lou ,Honglong, Chen, and Zhi Wang. "A consistency-based secure localization scheme against wormhole attacks in WSNs." In Wireless Algorithms, Systems, and Applications, pp. 368-377. Springer Berlin Heidelberg, 2009.
  10. Tassos, Dimitriou, and Athanassios Giannetsos. "Wormholes no more? localized wormhole detection and prevention in wireless networks." In Distributed Computing in Sensor Systems, pp. 334-347. Springer Berlin Heidelberg, 2010.
  11. Elisha O., Ochola, Mariki M. Eloff, and John A. van der Poll. "The failure of watchdog schemes in MANET security: a case of an intelligent black-hole." In Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp. 305-311. ACM, 2013
  12. Robert, Mitchell, and Ray Chen. "A survey of intrusion detection in wireless network applications." Computer Communications 42 (2014): 1-23
  13. João, Trindade, and Teresa Vazão. "Routing on large scale mobile ad hoc networks using bloom filters." Ad Hoc Networks 23 (2014): 34-51.
  14. Nidhi Lal. "An effective approach for mobile ad hoc network via I-Watchdog protocol." arXiv preprint arXiv:1412.8013 (2014).
Index Terms

Computer Science
Information Sciences

Keywords

MANET Security Wormholes Watchdog protocol.