CFP last date
15 May 2024
Reseach Article

Securing AODV against Wormhole Attack using Token based Approach

by Mohit Kumar, Nidhi Shalya
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 10
Year of Publication: 2012
Authors: Mohit Kumar, Nidhi Shalya
10.5120/ijais12-450807

Mohit Kumar, Nidhi Shalya . Securing AODV against Wormhole Attack using Token based Approach. International Journal of Applied Information Systems. 4, 10 ( December 2012), 24-27. DOI=10.5120/ijais12-450807

@article{ 10.5120/ijais12-450807,
author = { Mohit Kumar, Nidhi Shalya },
title = { Securing AODV against Wormhole Attack using Token based Approach },
journal = { International Journal of Applied Information Systems },
issue_date = { December 2012 },
volume = { 4 },
number = { 10 },
month = { December },
year = { 2012 },
issn = { 2249-0868 },
pages = { 24-27 },
numpages = {9},
url = { https://www.ijais.org/archives/volume4/number10/395-0807/ },
doi = { 10.5120/ijais12-450807 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:48:10.058627+05:30
%A Mohit Kumar
%A Nidhi Shalya
%T Securing AODV against Wormhole Attack using Token based Approach
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 4
%N 10
%P 24-27
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research. Since ad hoc networks are infrastructure less networks and the nodes in ad hoc networks are connected by a wireless links. As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network. In this paper, we are discussing the various attacks which are possible in MANET due to fabrication and worm hole attack in AODV and how to secure AODV against wormhole attack using token based approach. The propose method reduces the packet loss due to malicious nodes to a considerable extent and hence enhance the performance.

References
  1. Jeoren Hoebeke, Ingrid Moeman, Bart Dhoedt and Piet Demester " An Overview of Mobile Ad hoc Networks: Applications & Challenges. "
  2. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah " MANET Routing protocols & Wormhole Attack against AODV. " IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 4, April 2010
  3. Mohit Kumar, Rashmi Mishra "An Overveiw of MANET: History, Challenges & Applications. " Indian Journal of Computer Science and Engineering (IJCSE) ISSN : 0976-5166 Vol. 3 No. 1 Feb-Mar 2012
  4. Vivek Sharma, Amit Baghel "A Review of Security Attacks in MANET's. " Vol-II No. 2 (58-63) : (2011) Oct-2010-Jan-2011
  5. Mehdi Medadia, M. H. Yektaie, A. M. Rahamani "Combat with Black Hole attack in AODV Routing" 978-1-4244-4570-7/09 - 2009 IEEE
  6. G. S. Mamatha, Dr. S. C. Sharma " Network Layer Attacks & Defence Mechanism in MANETS – A Survey. " International Journal of Computer Science and Security, Volume (4): Issue (3)
  7. Radhika Saini, Manju Khari " Defining Malicious Behaviour of a node & its defensive methods in Ad hoc Networks. " International Journal of Computer Applications(0975 – 8887) Volume 20 – No. 4, April 2011.
  8. Farid Nait- Abdesselam, Brahmin Bensau "Detecting & Avoiding Wormhole attacks in Wireless Ad hoc Networks. " 0163-6804/08 IEEE Communications Magazine, April 2008
  9. Ritesh Maheshwari, Jie Gao, Samir Das " Detecting wormhole attacks using Connectivity Information. " 0743-166X/07 IEEE Communication Society , IEEE INFOCOM 2007.
  10. William Stallings "Cryptography and Network Security", Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006
Index Terms

Computer Science
Information Sciences

Keywords

Ad hoc AODV MANET