Prevention Of WormholeAttacks In Geographic Routing Protocol
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 1
Abstract
As mobile ad hoc network applications are deployed, security emerges as a central requirement..Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing (BSR) is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks.. In this paper we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Reverse Routing Scheme (RRS) attempts to detect the intrusion action .The second technique namely Authentication of Nodes Scheme (ANS) uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing (BSR)protocol and analysis and simulations are performed in network simulator (NS-2).
Authors and Affiliations
E. Poornima , C. Shoba Bindhu
Recent Advances in SRE Research
The importance and the real potential of the Requirements ngineering is now being well recognized. A series of reversed as well as assorted researches are underway particularly on ‘ways to incorporate security right fro...
Application of fuzzy-AHP extent analysis to determine the relative importance of risk factors in operative mortality after Coronary Artery Bypass surgery
The goal of this study is to recognize most important risk factors associated with surgical mortality in patient who underwent CABG by the integration of fuzzy concept and analytical hierarchy process method to represent...
MISSING DATA IMPUTATION IN CARDIAC DATA SET (SURVIVAL PROGNOSIS
Treating missing value is very big task in the data preprocessing methods. Missing data are a potential source of bias when analyzing clinical trials. In this paper we analyze the performance of different data imputatio...
QUALITY OF SERVICE FOR MOBILE AD-HOC WIRELESS NETWORKS
Mobile ad-hoc network (MANET) is a wireless network without infrastructure. Nodes can commutate each other without central infrastructure; because they are self organised and self configurable with easy deployment. To co...
Ternary Hierarchical Clustering with Data De-Duplication in Sensor Networks
Wireless Sensor Networks are resource constrained application specific adhoc networks. All the previous works have concentrated on the power aware techniques such as data aggregation, coordination of node operations for...