ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Wormhole Attack Elimination in Mobile Ad-hoc Networks With OPTIMIZED Multipath Algorithm

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.2, No. 10)

Publication Date:

Authors : ; ;

Page : 3028-3034

Keywords : Wormhole Attack; AODV; Multipath Algorithm; On Demand Routing Protocols; Route Request; Route Reply; Mobile Ad-hoc Network;

Source : Downloadexternal Find it from : Google Scholarexternal


Communication has different terms for different users in the technology. Wireless and Ad-hoc communication are two main communication medium which are fulfilling different domain requirement for the users. Talking about Ad-hoc networks, usually communication is based on the ad-hoc protocol policies. Most of the users in allover ad-hoc network using Ad-hoc On Demand Distance Vector Protocol (AODV) for the basic communication due to simplicity and reliability of protocol. More usage also attracts number of attackers which tends to disturb the communication. Most occurred attack in AODV network is Wormhole attack which provide lowest destination id to the source so t become the part of shortest selected path by AODV process. This attack starts proceeding by introducing the similar metrics which are taken into account by AODV while selecting the route for destination. It introduce lower number of hops and lower value of delay so that AODV will select the fake route defined by attack automatically and after attack launch, attack start decreasing the overall throughput of the network. Wormhole attack affects the network performance and overall network performance degraded a lot. To eliminate the effects of Wormhole attack, we have proposed a packet update scheme in which we fetch information from the neighbors for the enquiry of the suspected nodes in the network. Proposed scheme eliminate the Wormhole affects by finding all the malicious nodes which are present in the network and send broadcast to whole network for elimination of malicious nodes. Throughput and delay are the parameters for the performance measurements of the network. Proposed scheme provides better results with 37 % less delay as compared to the previous proposed schemes. Previous scheme provides slighter better results of 6% more throughput than our proposed scheme.

Last modified: 2014-11-12 22:11:47