We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Behavioral Study of Wormhole Attack in Routing for MANET

by Amrit Suman, Praneet Saurabh, Bhupendra Verma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 26 - Number 10
Year of Publication: 2011
Authors: Amrit Suman, Praneet Saurabh, Bhupendra Verma
10.5120/3138-4327

Amrit Suman, Praneet Saurabh, Bhupendra Verma . A Behavioral Study of Wormhole Attack in Routing for MANET. International Journal of Computer Applications. 26, 10 ( July 2011), 42-46. DOI=10.5120/3138-4327

@article{ 10.5120/3138-4327,
author = { Amrit Suman, Praneet Saurabh, Bhupendra Verma },
title = { A Behavioral Study of Wormhole Attack in Routing for MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2011 },
volume = { 26 },
number = { 10 },
month = { July },
year = { 2011 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume26/number10/3138-4327/ },
doi = { 10.5120/3138-4327 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:12:27.328378+05:30
%A Amrit Suman
%A Praneet Saurabh
%A Bhupendra Verma
%T A Behavioral Study of Wormhole Attack in Routing for MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 26
%N 10
%P 42-46
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. There is no fixed topology in this network due to the random mobility of nodes, interference, multipath propagation and path loss. Many Routing protocols have been proposed and developed for accomplishing this task. The intent of this paper is to analyze three ad-hoc routing protocols AODV, DYMO, FISHEYE against wormhole attack in wireless network. This paper concentrates evaluating the performance of routing protocols when wormhole attacks involve in wireless network. The performance analysis for above protocol is based on variation in speed of nodes in a network with 50 nodes. All simulation is carried out with QualNet 5.0 simulator.

References
  1. M. Frodigh, P. Johansson, and P. Larsson. “Wireless ad hoc networking: the art of networking without a network”, Ericsson Review, No.4, 2000, pp. 248-263.
  2. G.V.S. Raju and G. Hernandez, “Routing in Ad hoc networks,” in proceedings of the IEEE– SMC International Conference, October 2002.
  3. Qualnet Simulator Documentation. “Qualnet 5.0 User`s Guide”, Scalable Network Technologies, Inc., Los Angeles, CA 90045, 2006.
  4. Daniel Lang, “On the Evaluation and Classification of Routing Protocols for Mobile Ad Hoc Networks “2006.
  5. Rama Murti “Wireless Networking” 2008.
  6. Julian Hsu Julian Hsu, Sameer Bhatia, Mineo Takai, Rajive Bagrodia Performance of mobile ad hoc networking protocol in realistic scenario 2005.
  7. Existing MANET Routing Protocols and Metrics used Towards the Efficiency and Reliability- An Overview Shafinaz Buruhanudeen, Mohamed Othman, Mazliza Othman, Borhanuddin Mohd Ali Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia 1-4244-1094-0/07©2007 IEEE.
  8. A.Boomarani Malany 1, V.R.Sarma Dhulipala 2, and RM.Chandrasekaran 3 “Throughput and Delay Comparison of MANET Routing Protocols”, Int. J. Open Problems Compt. Math.,Vol. 2, No. 3, September 2009 ISSN 1998-6262; Copyright ©ICSRS Publication, 2009 www.icsrs.org .
  9. Layuan, Li Chunlin, Yaun Peiyan “Performance evaluation and simulation of routing protocols in ad hoc networks”, February 2007, Computer Communication.
  10. Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing”, IEEE Security and Privacy, 1540- 7993/04/$20.00 © 2004 IEEE, May/June 2004.
  11. D. Djenouri, A. Derhab, and N. Badache. Ad hoc networks routing protocols and mobility. Int. Arab J. Inf. Technol.3 (2):126–133, 2006
  12. Rajiv Misra, C.R.Mandal”Performance Comparison of AODV/DSR On-demand Routing Protocols for Ad Hoc Networks in Constrained Situation”0-7803-8964-6/05/$20.00 lEEE 2005.
  13. A Performance Comparison of Routing Protocols for Large-Scale Wireless Mobile Ad Hoc Networks Ioannis Broustis Gentian Jakllari Thomas Repantis Mart Molle Department of Computer Science & Engineering University of California, Riverside 2004.
  14. Xin Yu, "Distributed Cache Updating for the Dynamic Source Routing Protocol," IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 609-626, Jun., 2006.
  15. Charles E.Perkins. Ad hoc Networking, Addison-Wedey, 2001.
  16. T. S. Rappaport. Wireless Communications: Principles and Practice. Prentice-Hall, 1996.
  17. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”. International Journal of Network Security, Vol.5, No.3, PP.338–346, Nov. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Ad Hoc Networks routing protocol Wormhole attack AODV DYMO FISHEYE