Novel Method for the Detection of Wormhole Attack in Delay Tolerant Network
Journal: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) (Vol.4, No. 6)Publication Date: 2016-01-08
Authors : Jyothi D G; Ajay Kumar S N; Dr.Chandra shekara S N;
Page : 153-157
Keywords : Key words: wormhole attack; Delay Tolerant Network; Unit Disk Graph.;
Abstract
ABSTRACT Wireless communication faces several security risks. In this paper, we are concerned of a particularly severe security attack that affects the Delay Tolerant Networks routing protocols, it is called the wormhole attack. The algorithm uses the local connectivity information to look for forbidden substructures in the network connectivity graph. Our proposed methodology is wholly localized and it does not use any special hardware or location information of the nodes, making this technique universally applicable. The objective of this paper is to develop a methodology to detect the presence of malicious nodes, causing forbidden structure in the network, using only local connectivity information.
Other Latest Articles
- Analysis of the Performance of Active Type SFCL and FCL for Reduction Capability�s Under Fault Current and Over Voltage in a Dg Source Integrated Distribution System
- A study of WAN design, routing protocols and connectivity between Head office to Branch office
- Architecture of Mobile Cloud Computing and Middleware
- Security Analysis of NFC Technology Compared with other Mobile Wireless Technologies
Last modified: 2016-01-08 14:33:58