Title :
MAODV: Modified wormhole detection AODV protocol
Author :
Chaurasia, Umesh Kumar ; Singh, V.
Author_Institution :
Dept. of Electr. Eng., Nat. Inst. of Technol., Raipur, India
Abstract :
Mobile ad-hoc networks are a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure. In mobile ad-hoc networks, data transmission is performed within an untrusted wireless environment. The lack of centralized infrastructure in ad-hoc network makes it vulnerable to various attacks. Wormhole attack is one of the most severe attacks with mobile ad-hoc networks. In wormhole attack, a malicious node records data packets at one location in the network and tunnels them to another malicious node far away, which retransmits them into the network locally. Some of the researchers have proposed many solutions for wormhole attack. In this paper an efficient method to detect a wormhole attack called modified wormhole detection AODV protocol has been proposed. Detection of wormhole attack is performed using number of hops in different paths from source to destination and delay of each node in different paths from source to destination. The destination is able to detect both kinds of wormhole attacks. The performance of modified wormhole detection AODV protocol is justified by simulations.
Keywords :
mobile ad hoc networks; routing protocols; telecommunication security; MAODV; centralized infrastructure; data packets; data transmission; malicious node; mobile ad-hoc networks; wireless mobile hosts; wormhole attack; wormhole detection AODV protocol; Ad hoc networks; Delays; Mobile communication; Mobile computing; Routing protocols; Wireless communication; Ad-hoc networks; Security; Tunnel; Wireless; Wormhole attack;
Conference_Titel :
Contemporary Computing (IC3), 2013 Sixth International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-0190-6
DOI :
10.1109/IC3.2013.6612197