IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 9 - Issue 11, November 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Efficient Mechanism For Identification Of Malicious Node Of Wormhole In Dynamic Source Routing Protocol

[Full Text]

 

AUTHOR(S)

Nisha Sharma, Manish Sharma, Durga Prasad Sharma

 

KEYWORDS

MANET, DSR, Trust-Based, Wormhole Attack, NS3.

 

ABSTRACT

The diverse characteristics of ad-hoc networks of being infrastructure-less, self-organized and spontaneous make the task more challenging to secure it. If a node needs to send data to a node that is beyond the transmission range of it, the sender node asks favor of other nodes in the network to reach the destination node. Thus the existence of the ad-hoc network is completely reliant on nodes cooperating and trusting each other. The repeated non-cooperative behavior of a node with other nodes makes it unreliable for future communication and is considered as a malicious node. However, this dependency of network nodes on each other makes MANET vulnerable to various kinds of security attacks. These security attacks can be categorized as Passive and Active attacks. Wormhole attack is an active attack and considered most dangerous as it can cause major damage to routing. Numerous secure routing protocols have been developed which are based on cryptography mechanism, need pre-organized structure, centralized authority, or need external hardware, etc. These mechanisms are impractical because of limited available resources in MANET. In this paper, we are proposing a novel trust-based mechanism on the concept of Node to Node packet delay for the detection of the malicious node in a wormhole attack. The trust value of each node is calculated by observing the packet transaction among adjacent nodes and based on this trust value identification of malicious node is carried out. The trust values can be further considered for making routing decisions and selecting a secured route.

 

REFERENCES

[1] S. Corson, J. Macker., “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, IETF RFC2501, 1999.
[2] L. Zhou, Z. J. Haas., ”Securing Ad Hoc Networks”. IEEE Network, 13(6): 24-30, 1999.
[3] Yongguang Zhang, Wenke Lee. “ Intrusion Detection in Wireless Ad-Hoc Networks”, Proceedings of MobiCom 2000, Sixth Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6-11, 2000.
[4] Y. C. Hu, A. Perrig, and D. B. Johnson., “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks”, in Proc. INFOCOM, Vol. 3, pp. 1976-1987, 2003.
[5] Capkun. S., Buttyan. L. & Hubaux. J. P., “SECTOR: secure tracking of node encounters in multi-hop wireless networks”, in Proc. First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.
[6] L. Hu and D. Evan., “Using Directional Antennas to Prevent Wormhole Attacks”, In Network and Distributed System Security Symposium, San Diego, California, USA,2004,pp.2.
[7] Khalil, S. Bagchi, N. B. Shroff., “A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Network”, Proceedings of the 2005 International Conference on Dependable Systems and Networks,2005, 0-7695-2282-3/05.
[8] Jakob Eriksson, Srikanth V. Krishnamurthy, and MichalisFaloutsos. , “TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks”, 14th IEEE International Conference on Network Protocols, pp. 75-84, 2006.
[9] P. Van Tran, L. X. Hung, Y. K. Lee, S. Lee, and H. Lee,. “TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks”, 2007 4th Annu. IEEE Consum. Commun. Netw. Conf. CCNC 2007, pp. 593–598, 2007.
[10] Saurabh Gupta, Subrat Kar, S Dharmaraja. ,”WHOP: Wormhole Attack Detection Protocol using Hound Packets”, IEEE, 978-1-4577-0314-0/11,2011.
[11] Dhruvi Sharma, Vimal Kumar, Rakesh Kumar. “Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET”, Computational Intelligence in Data Mining. Volume 2. Volume 411 of the series Advances in Intelligent Systems and Computing pp 475-485., Springer, 2015.
[12] Sayan Majumdar, Prof. Dr. Debika Bhattacharyya., “Mitigating Wormhole Attack in MANET using Absolute Deviation Statistical Approach”, IEEE 8th Annual Computing and Communication Workshop and Conference, pp 317-320,2018.
[13] V. Kavitha, T.Sujithra, D.Lavanya.,” Trust Based Reliable Routing Protocol for Manets”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), SCOPUS, pp. 1595-1598,2019.
[14] David B. Johnson, David A. Maltz, and Josh Broch, “The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In Ad Hoc Networking”, edited by Charles E. Perkins, chapter 5, pages 139– 172. Addison-Wesley,2001.
[15] Vivek Sharma Amit Baghel,Anal “ysis of AODV and DSR in Presence of Wormhole Attack in Mobile Ad-hoc Network”, International Journal of Engineering Science and Technology Vol. 2(11), pp. 6657-6662, 2010,.
[16] The ns-3 network simulator. http://www.nsnam.org.