Wormhole Attack Elimination in Mobile Ad-hoc Networks With OPTIMIZED Multipath Algorithm
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.2, No. 10)Publication Date: 2013-10-30
Authors : Waseem Ahad; Varun Sharma;
Page : 3028-3034
Keywords : Wormhole Attack; AODV; Multipath Algorithm; On Demand Routing Protocols; Route Request; Route Reply; Mobile Ad-hoc Network;
Abstract
Communication has different terms for different users in the technology. Wireless and Ad-hoc communication are two main communication medium which are fulfilling different domain requirement for the users. Talking about Ad-hoc networks, usually communication is based on the ad-hoc protocol policies. Most of the users in allover ad-hoc network using Ad-hoc On Demand Distance Vector Protocol (AODV) for the basic communication due to simplicity and reliability of protocol. More usage also attracts number of attackers which tends to disturb the communication. Most occurred attack in AODV network is Wormhole attack which provide lowest destination id to the source so t become the part of shortest selected path by AODV process. This attack starts proceeding by introducing the similar metrics which are taken into account by AODV while selecting the route for destination. It introduce lower number of hops and lower value of delay so that AODV will select the fake route defined by attack automatically and after attack launch, attack start decreasing the overall throughput of the network. Wormhole attack affects the network performance and overall network performance degraded a lot. To eliminate the effects of Wormhole attack, we have proposed a packet update scheme in which we fetch information from the neighbors for the enquiry of the suspected nodes in the network. Proposed scheme eliminate the Wormhole affects by finding all the malicious nodes which are present in the network and send broadcast to whole network for elimination of malicious nodes. Throughput and delay are the parameters for the performance measurements of the network. Proposed scheme provides better results with 37 % less delay as compared to the previous proposed schemes. Previous scheme provides slighter better results of 6% more throughput than our proposed scheme.
Other Latest Articles
- Immobilized Bioreactors for the Treatment of Industrial Wastewater ? A Comparative Study
- Easing Complication and Error Detection of RS Codes Using CA based Codes
- Facies and Depositional Environments of Cretaceous Siliciclastic Sediments in Al Bauga Area, Northern Sudan
- Identification of Biclustering Algorithms for Gene Extraction
- An E-Learning System Architecture Based on New Business Paradigm Using Cloud Computing
Last modified: 2014-11-12 22:11:47