New approach through detection and prevention of wormhole attack in MANET
Title | New approach through detection and prevention of wormhole attack in MANET |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Verma, R., Sharma, R., Singh, U. |
Conference Name | 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA) |
Keywords | Aerospace electronics, arbitrary network topologies, attack prevention, compositionality, contagious nodes, electromagnetic radio waves, full routing method., Local Area Network consists, malicious node, MANET, Metrics, mobile ad hoc network, mobile ad hoc networks, Mobile adhoc Network, Mobile communication, mobile computing, pubcrawl, resilience, Resiliency, Routing, Routing protocols, security, telecommunication network routing, telecommunication network topology, telecommunication security, temporary network topologies, tunneling, unique wormhole detection and prevention algorithm, Victimization, wireless mobile nodes, wormhole attack |
Abstract | A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with each other through electromagnetic radio waves. Mobile Ad hoc Network (MANET) consists of mobile nodes, the network is infrastructure less. It dynamically self organizes in arbitrary and temporary network topologies. Security is extremely vital for MANET. Attacks pave way for security. Among all the potential attacks on MANET, detection of wormhole attack is very difficult.One malicious node receives packets from a particular location, tunnels them to a different contagious nodes situated in another location of the network and distorts the full routing method. All routes are converged to the wormhole established by the attackers. The complete routing system in MANET gets redirected. Many existing ways have been surveyed to notice wormhole attack in MANET. Our proposed methodology is a unique wormhole detection and prevention algorithm that shall effectively notice the wormhole attack in theMANET. Our notion is to extend the detection as well as the quantitative relation relative to the existing ways. |
URL | https://ieeexplore.ieee.org/document/8212719/ |
DOI | 10.1109/ICECA.2017.8212719 |
Citation Key | verma_new_2017 |
- mobile computing
- wormhole attack
- wireless mobile nodes
- Victimization
- unique wormhole detection and prevention algorithm
- tunneling
- temporary network topologies
- telecommunication security
- telecommunication network topology
- telecommunication network routing
- security
- Routing protocols
- Routing
- Resiliency
- resilience
- pubcrawl
- Aerospace electronics
- Mobile communication
- Mobile adhoc Network
- mobile ad hoc networks
- mobile ad hoc network
- Metrics
- MANET
- malicious node
- Local Area Network consists
- full routing method.
- electromagnetic radio waves
- contagious nodes
- Compositionality
- attack prevention
- arbitrary network topologies