We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Novel Defense IPS Scheme against Wormhole Attack in MANET

by Mohini Gupta, Amit Kanungo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 17
Year of Publication: 2013
Authors: Mohini Gupta, Amit Kanungo
10.5120/13958-1516

Mohini Gupta, Amit Kanungo . A Novel Defense IPS Scheme against Wormhole Attack in MANET. International Journal of Computer Applications. 79, 17 ( October 2013), 1-5. DOI=10.5120/13958-1516

@article{ 10.5120/13958-1516,
author = { Mohini Gupta, Amit Kanungo },
title = { A Novel Defense IPS Scheme against Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 17 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number17/13958-1516/ },
doi = { 10.5120/13958-1516 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:53:13.325306+05:30
%A Mohini Gupta
%A Amit Kanungo
%T A Novel Defense IPS Scheme against Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 17
%P 1-5
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security is one of the major issue in Mobile Ad hoc Network (MANET). Each node in the Ad hoc network has work as router to take part in route establishment and data delivery in between sender and destination, thus highly cooperative nodes are required to ensure that the initiated data transmission process does not fail. Worm hole attack is a type of attack that are work as to established path in between sender and receiver but if the sender has start data transmission then in that case the worm hole attacker has create a direct link, referred to as a wormhole tunnel between them, it means more of the number of trusted nodes it means higher successful data communication process rates may well expected. In this paper we proposed Intrusion detection as well as prevention technique (IPS) against wormhole attack, for detection we use routing entry base detection technique and get attacker node information like node number, number of attack packet, attack time etc. after that we prevent wormhole attack using neighbor trust worthy base technique and secure the mobile ad-hoc network communication, through our proposal we provide secure as well as reliable communication and simulate through network simulator-2 and analyze the network behavior in attack and prevention case. After that we measure the performance of network on the bases of network parameter like throughput, packet delivery ratio, overall analysis, routing load etc.

References
  1. C. Siva Ram Murthy and B S Manoj, 'Mobile Ad Hoc Networks-Architecture and Protocols", Pearson Education, ISBN 81-317-0688-5 ,2004.
  2. Theodore S. Rappaport, "Wireless Communication" Prentice Publisher, ISBN 0133755363, January 1994.
  3. Yongguang Zhang and Wenke Lee, Security in Mobile Ad-Hoc Networks, in Book Ad Hoc Networks Technologies and Protocols, Springer, 2005.
  4. Jangra1,A. Goel,N. Priyanka and Bhati,K. - Security Aspects in Mobile Ad Hoc Networks (MANETs): A Big Picture, International Journal of Electronics Engineering, pp. 189-196, 2010.
  5. Debdutta Barman Roy, Rituparna Chaki and Nabendu Chaki, "A New Cluster-Based Wormhole Intrusion Detection Algorithm For Mobile Ad-Hoc Networks", International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.
  6. John S. Baras, Svetlana Radosavac, George The odorakopoulos. "Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR". In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2007.
  7. N. Song, L. Qian, X. Li. "Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach". In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.
  8. X. Su, R. V. Boppana, "On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks," IEEE International Conference on Communications, ICC '07, pp. 1136-1141, June 2007.
  9. M. A. Gorlatova, P. C. Mason, M. Wang, L. Lamont, R. Liscano, "Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military Communications Conference, MILCOM 2006, pp. 1-7, October 2006.
  10. Y. C. Hu, A. Perrig and D. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proceedings of the ACM Workshop on Wireless Security (WiSe), SanDiego, California, pp. 30-40, Septe.
Index Terms

Computer Science
Information Sciences

Keywords

MANET routing wormhole IPS ns-2