EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 10

Securing AODV against Wormhole Attack using Token based Approach

journal image
  • International Journal of Applied Information Systems
  • Foundation of Computer Science (FCS), NY, USA
  • Volume 4 - Number 10
  • Year of Publication: 2012
  • Authors: Mohit Kumar, Nidhi Shalya
  • 10.5120/ijais12-450807
 Download
1534
  • Mohit Kumar and Nidhi Shalya 2012. Securing AODV against Wormhole Attack using Token based Approach. International Journal of Applied Information Systems. 4, 10 (December 2012), 24-27. DOI=http://dx.doi.org/10.5120/ijais450807
  • @article{10.5120/ijais2017451568,
    author = {Mohit Kumar and Nidhi Shalya},
    title = {Securing AODV against Wormhole Attack using Token based Approach},
    journal = {International Journal of Applied Information Systems},
    issue_date = {December 2012},
    volume = {4},
    number = {},
    month = {December},
    year = {2012},
    issn = {},
    pages = {24-27},
    numpages = {},
    url = {/archives/volume4/number10/395-0807},
    doi = { 10.5120/ijais12-450807},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450807
    %A Mohit Kumar
    %A Nidhi Shalya
    %T Securing AODV against Wormhole Attack using Token based Approach
    %J International Journal of Applied Information Systems
    %@ 
    %V 4
    %N 
    %P 24-27
    %D 2012
    %I  xA9 2012 by IJAIS Journal
    

Abstract

In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research. Since ad hoc networks are infrastructure less networks and the nodes in ad hoc networks are connected by a wireless links. As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network. In this paper, we are discussing the various attacks which are possible in MANET due to fabrication and worm hole attack in AODV and how to secure AODV against wormhole attack using token based approach. The propose method reduces the packet loss due to malicious nodes to a considerable extent and hence enhance the performance.

References

  1. Jeoren Hoebeke, Ingrid Moeman, Bart Dhoedt and Piet Demester " An Overview of Mobile Ad hoc Networks: Applications & Challenges. "
  2. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah " MANET Routing protocols & Wormhole Attack against AODV. " IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 4, April 2010
  3. Mohit Kumar, Rashmi Mishra "An Overveiw of MANET: History, Challenges & Applications. " Indian Journal of Computer Science and Engineering (IJCSE) ISSN : 0976-5166 Vol. 3 No. 1 Feb-Mar 2012
  4. Vivek Sharma, Amit Baghel "A Review of Security Attacks in MANET's. " Vol-II No. 2 (58-63) : (2011) Oct-2010-Jan-2011
  5. Mehdi Medadia, M. H. Yektaie, A. M. Rahamani "Combat with Black Hole attack in AODV Routing" 978-1-4244-4570-7/09 - 2009 IEEE
  6. G. S. Mamatha, Dr. S. C. Sharma " Network Layer Attacks & Defence Mechanism in MANETS – A Survey. " International Journal of Computer Science and Security, Volume (4): Issue (3)
  7. Radhika Saini, Manju Khari " Defining Malicious Behaviour of a node & its defensive methods in Ad hoc Networks. " International Journal of Computer Applications(0975 – 8887) Volume 20 – No. 4, April 2011.
  8. Farid Nait- Abdesselam, Brahmin Bensau "Detecting & Avoiding Wormhole attacks in Wireless Ad hoc Networks. " 0163-6804/08 IEEE Communications Magazine, April 2008
  9. Ritesh Maheshwari, Jie Gao, Samir Das " Detecting wormhole attacks using Connectivity Information. " 0743-166X/07 IEEE Communication Society , IEEE INFOCOM 2007.
  10. William Stallings "Cryptography and Network Security", Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006

Keywords

Ad hoc, AODV, MANET

Index Terms

Computer Science
Information Sciences