ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

DETECTION AND ISOLATION OF WORMHOLE ATTACK IN MANET

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.8, No. 11)

Publication Date:

Authors : ; ;

Page : 127-137

Keywords : Wormhole; Delay per hop; attacker; MANETs; Throughput; Delay;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The mobile adhoc network is a collection of mobile nodes. These mobile nodes can communicate with each other without using physical infrastructure. MANET has a decentralized network so there is no control on the nodes. Mobile nodes can freely leave or join the network when they want. Sometime malicious nodes can join the network and trigger the wormhole attack. The wormhole attack is the active type of attack which affects network performance to great extent. The wormhole attack is triggered by the malicious nodes. Wormhole nodes do not have any knowledge about the network. They can establish themselves anywhere in the network. Wormholes nodes create tunnel in the network and increase delay in the network. The techniques which are proposed so far are based on the threshold based techniques for the detection of malicious nodes. The threshold value of certain parameters may vary due to various factors like congestion and link failure. When the threshold value of parameters varies then it affects heavily the accuracy of malicious node detection. In the proposed study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The proposed scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the proposed scheme shows better performance in comparison with existing approaches. The results of proposed two phase verification is compared with CREDND scheme in terms of packet loss, energy, throughput for the detection of malicious nodes and the result shows that the proposed work leads greater performance than the existing one.

Last modified: 2019-12-12 07:17:49