Open Access   Article Go Back

Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET

G.Kalpana 1 , S.Archana 2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-7 , Page no. 133-138, Jul-2015

Online published on Jul 30, 2015

Copyright © G.Kalpana , S.Archana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: G.Kalpana , S.Archana, “Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.133-138, 2015.

MLA Style Citation: G.Kalpana , S.Archana "Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET." International Journal of Computer Sciences and Engineering 3.7 (2015): 133-138.

APA Style Citation: G.Kalpana , S.Archana, (2015). Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET. International Journal of Computer Sciences and Engineering, 3(7), 133-138.

BibTex Style Citation:
@article{_2015,
author = { G.Kalpana , S.Archana},
title = {Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2015},
volume = {3},
Issue = {7},
month = {7},
year = {2015},
issn = {2347-2693},
pages = {133-138},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=589},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=589
TI - Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - G.Kalpana , S.Archana
PY - 2015
DA - 2015/07/30
PB - IJCSE, Indore, INDIA
SP - 133-138
IS - 7
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2507 2283 downloads 2518 downloads
  
  
           

Abstract

An ad hoc network refers to a network connection established for a single session and does not essential a router or a wireless base station. A MANET is a collection of mobile nodes connected through wireless networks. MANET can join and leave the network dynamically. However, MANET is particularly vulnerable due to its fundamental characteristics, such as dynamic topology, distributed co-operation, and constrained capability. One main challenge on designing these networks is their vulnerability to security attacks.In this paper the performance of Threshold Based Algorithms using routing protocols AODV and DSR with wormhole attack detection have been analysed using NS2 considering various parameters such as packet delivery ratio and average throughput to evaluate its performance.

Key-Words / Index Term

MANET;AODV;DSR;Wormhole

References

[1] V. Mahajan, M. Natu, A. Sethi. “Analysis of wormhole intrusion attacks in MANETS”. In IEEE Military Communications Conference (MILCOM), pp. 1-7, 2008.
[2] Dipali Koshti,” Comparative study of Techniques used for Detection of Selfish Nodes in Mobile Ad hoc Networks”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, 2011.
[3] S.Archana, Dr.G.Kalpana, “ A Survey on Security Attacks in Mobile Ad Hoc Network”, National Conference on INNOVATIVE TRENDS IN INFORMATION TECHNOLOGY(NCITIT) ISBN:978-93-84743-32-1,7 FEB-2015
[4] Chattopadhyay, Mekhala. AN APPROACH TO DETECT WORMHOLE ATTACK IN AODV BASED MANET. Diss. Jadavpur University Kolkata-700032 India 2014.
[5] S.Archana, Dr.G.Kalpana, “A Comparative Analysis of AODV and DSR Protocol under Wormhole Attack in MANET”, International Conference on Innovation Information and Embedded and Communication System, March-2015
[6] Perkins CE, Royer EM, Chakeres “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF , October, 2003.
[7] Abhay Kumar Rai, Rajiv Ranjan Tewari & Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication”, International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3) 265, 2010.
[8] F. Nait-Abdesselam, B. Bensaou, T. Taleb. “Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks”, IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.
[9] Network Simulator 2. http://isi. edu/nsnam/ns/
[10] Saurabh Upadhyay and Aruna Bajpai, Avoiding Wormhole Attack in MANET using Statistical Analysis Approach, International Journal on Cryptography and Information Security(IJCIS),Vol.2, No.1,March 2012.
[11] K.Santhi and Dr.M.Punithavalli “Optimized Reliable And Load Balanced Routing Protocol For Mobile Ad
Hoc Networks” -Journal of Theoretical and Applied Information Technology (JATIT))-Vol.51 No.3 May 2013
[12] Reshmi Maulik and Nabendu Chaki, “A Study on Wormhole Attacks in MANET”, International Journal of Computer Information Systems and Industrial Management Applications, ISSN 2150-7988 Volume 3 (2011) pp. 271-279.
[13] Mohammed Saeed Alkatheiri, Jianwei Liu and Abdur Rashid Sangi, “AODV Routing Protocol Under Several Routing Attacks in MANETs”, 978-1-61284-307-0/11, IEEE, 2011.
[14] Shalini Jain, Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile adhoc networks”, International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 pp 1793-8201.
[15] R. Vembu, R. Syed Hayath, “ Methodology For Comparing Reactive Routing Protocols To Detect And Prevent The Wormhole Attack Using Path Tracing Approach” IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) e-ISSN: 2278-2834, p-ISSN: 2278-8735 PP 12-17.