ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Comparison of Different Methods to identify wormhole attacks in MANETS

Journal: International Journal of Advanced Networking and Applications (Vol.4, No. 05)

Publication Date:

Authors : ; ;

Page : 1760-1765

Keywords : Measures; DSR protocol; PT method; TWOACK scheme; Wormhole Attack prevention(WAP);

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the dynamic change in topology finding route is very difficult. Some nodes misbehave as they participate in route establishment phase but refuse to forward the data packets to conserve their own energy. In this paper we are going to compare three different methods (PT method, WAP method, TWOACK method) to detect misbehaving nodes. Simulation is carried through NS2 and the results of misbehaving nodes are compared and tabulated.

Last modified: 2015-12-03 18:27:37