Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm

Rajpal Singh Khainwar, Anurag Jain, Jagdish Prasad Tyagi


In MANET, the more security is required in comparison to wired network. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack. The wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them. In this paper we specifically considering Wormhole attack. Instead  of  detecting  suspicious routes as  in  previous methods,  in this paper we  implement a  new  method which detects malicious nodes and works without modification of protocol,  using  a  hop-count  and time delay analysis  from  the users point of view without any special environment assumptions. The proposed work is simulated using OPNET and results showing the advantages of proposed work.

Keywords: ad hoc network, hop-count analysis, network security, wormhole attack.

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: NCS@iiste.org

ISSN (Paper)2224-610X ISSN (Online)2225-0603

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org