The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis
Keywords:
MANET, WormholeAbstract
A temporary network of wireless mobile hosts without the assistance of standard administration form mobile ad hoc network (MANET). It has a dynamic topology because mobiles can enter and leave the network continuously. As MANET are wireless, dynamic and have no central administration, maintaining security in this network is difficult. The wireless nature of the communication makes nodes susceptible to various kinds of attacks such as black hole attack, worm hole attacks, DoS attacks etc. In present work, we aim at detection and prevention of the wormhole attack
References
[1] “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm”, Monika Shivhare1 , Prof. Praveen Kumar , Gautam Department of Computer Science and Engineering Sagar Institute of Research & Technology, Indore, India, IJESC,Volume 7,IssueNo. 5,2017
[2] Dhruvi Sharma, Vimal Kumar, Rakesh Kumar, " Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET " , Computational Intelligence in Data Mining. Volume 2. Volume 411 of the series “Advances in Intelligent Systems and Computing” pp 475-485. 10 December 2015, Springer.
[3] “Wormhole Attack Detection and Prevention in MANET Using Bait Scheme” Harjinder Kaur , Sukhjit Singh ,Department of Electronics Golden College, Gurdaspur, India,IJESC,Volume 7,IssueNo. 5,2017
[4] " Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach" , IEEE Systems Journal, Vol. 9, No. 1, March 2015
[5] “Security issues in MANET”,Rashid Sheikh,Mahakal Singh Chandel,Durgesh Kumar Mishra, 978-1-4244-7202-4/10 IEEE 2010.
[6] P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in proceedings of IEEE ICDCSW‟ 01, pp. 413–18, Apr. 2001
[7] T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, pp. 1568- 1576, 2001.
[8] Wireless sensor Network security by Intrusion Detection in Energy Efficient Way by P N Rajitha et al,International Journal of Science Engineering and Technology Research,Vol 5,Issue 4, April 2016.
[9] Honeypot-An external layer of security against advanced attacks on Networks by Aaditya Jain et al. ,3rd International Conference on Recent Trends in Engineering Science and Management,April 2016. [10] A. P. K. Gagandeep, "Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review," International Journal of Engineering and Advanced Technology (IJEAT), vol. 1, no. 5, 2012
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
