Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET
Keywords:
MANET, AODV, DSR, WormholeAbstract
An ad hoc network refers to a network connection established for a single session and does not essential a router or a wireless base station. A MANET is a collection of mobile nodes connected through wireless networks. MANET can join and leave the network dynamically. However, MANET is particularly vulnerable due to its fundamental characteristics, such as dynamic topology, distributed co-operation, and constrained capability. One main challenge on designing these networks is their vulnerability to security attacks.In this paper the performance of Threshold Based Algorithms using routing protocols AODV and DSR with wormhole attack detection have been analysed using NS2 considering various parameters such as packet delivery ratio and average throughput to evaluate its performance.
References
V. Mahajan, M. Natu, A. Sethi. “Analysis of wormhole intrusion attacks in MANETS”. In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008.
Dipali Koshti,” Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, 2011.
S.Archana, Dr.G.Kalpana, “ A Survey on Security Attacks in Mobile Ad Hoc Network”, National Conference on INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY(NCITIT) ISBN:978-93-84743-32-1,7 FEB-2015
Chattopadhyay, Mekhala. AN APPROACH TO DETECT WORMHOLE ATTACK IN AODV BASED MANET. Diss. Jadavpur University Kolkata-700032 India 2014.
S.Archana, Dr.G.Kalpana, “A Comparative Analysis of AODV and DSR Protocol under Wormhole Attack in MANET”, International Conference on Innovation Information and Embedded and Communication System, March-2015
Perkins CE, Royer EM, Chakeres “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF , October, 2003.
Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication”, International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) 265, 2010.
F. Nait-Abdesselam, B. Bensaou, T. Taleb. “Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks”, IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.
Network Simulator 2. http://isi. edu/nsnam/ns/
Saurabh Upadhyay and Aruna Bajpai, Avoiding Wormhole Attack in MANET using Statistical Analysis Approach, International Journal on Cryptography and Information Security(IJCIS),Vol.2, No.1,March 2012.
K.Santhi and Dr.M.Punithavalli “Optimized Reliable And Load Balanced Routing Protocol For Mobile Ad
Hoc Networks” -Journal of Theoretical and Applied Information Technology (JATIT))-Vol.51 No.3 May 2013
Reshmi Maulik and Nabendu Chaki, “A Study on Wormhole Attacks in MANET”, International Journal of Computer Information Systems and Industrial Management Applications, ISSN 2150-7988 Volume 3 (2011) pp. 271-279.
Mohammed Saeed Alkatheiri, Jianwei Liu and Abdur Rashid Sangi, “AODV Routing Protocol Under Several Routing Attacks in MANETs”, 978-1-61284-307-0/11, IEEE, 2011.
Shalini Jain, Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile adhoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 pp 1793-8201.
R. Vembu, R. Syed Hayath, “ Methodology For Comparing Reactive Routing Protocols To Detect And Prevent The Wormhole Attack Using Path Tracing Approach” IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) e-ISSN: 2278-2834, p-ISSN: 2278-8735 PP 12-17.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
