Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

Securing AODV against Wormhole Attack using Token based Approach

Mohit Kumar, Nidhi Shalya Published in Wireless

International Journal of Applied Information Systems
Year of Publication: 2012
© 2012 by IJAIS Journal
10.5120/ijais12-450807
Download full text
  1. Mohit Kumar and Nidhi Shalya. Article: Securing AODV against Wormhole Attack using Token based Approach. International Journal of Applied Information Systems 4(10):24-27, December 2012. BibTeX

    @article{key:article,
    	author = "Mohit Kumar and Nidhi Shalya",
    	title = "Article: Securing AODV against Wormhole Attack using Token based Approach",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 4,
    	number = 10,
    	pages = "24-27",
    	month = "December",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

In present scenario, ad hoc network become the prominent mode of communication for mobile devices. Hence, becoming a elementary field of research. Since ad hoc networks are infrastructure less networks and the nodes in ad hoc networks are connected by a wireless links. As nodes are connected by wireless links, its becomes easier for attacker to disrupt in the ad hoc networks. Therefore security is the major issue in ad hoc networks as compared to wired network. In this paper, we are discussing the various attacks which are possible in MANET due to fabrication and worm hole attack in AODV and how to secure AODV against wormhole attack using token based approach. The propose method reduces the packet loss due to malicious nodes to a considerable extent and hence enhance the performance.

Reference

  1. Jeoren Hoebeke, Ingrid Moeman, Bart Dhoedt and Piet Demester " An Overview of Mobile Ad hoc Networks: Applications & Challenges. "
  2. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar and Bhavin I. Shah " MANET Routing protocols & Wormhole Attack against AODV. " IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No. 4, April 2010
  3. Mohit Kumar, Rashmi Mishra "An Overveiw of MANET: History, Challenges & Applications. " Indian Journal of Computer Science and Engineering (IJCSE) ISSN : 0976-5166 Vol. 3 No. 1 Feb-Mar 2012
  4. Vivek Sharma, Amit Baghel "A Review of Security Attacks in MANET's. " Vol-II No. 2 (58-63) : (2011) Oct-2010-Jan-2011
  5. Mehdi Medadia, M. H. Yektaie, A. M. Rahamani "Combat with Black Hole attack in AODV Routing" 978-1-4244-4570-7/09 - 2009 IEEE
  6. G. S. Mamatha, Dr. S. C. Sharma " Network Layer Attacks & Defence Mechanism in MANETS – A Survey. " International Journal of Computer Science and Security, Volume (4): Issue (3)
  7. Radhika Saini, Manju Khari " Defining Malicious Behaviour of a node & its defensive methods in Ad hoc Networks. " International Journal of Computer Applications(0975 – 8887) Volume 20 – No. 4, April 2011.
  8. Farid Nait- Abdesselam, Brahmin Bensau "Detecting & Avoiding Wormhole attacks in Wireless Ad hoc Networks. " 0163-6804/08 IEEE Communications Magazine, April 2008
  9. Ritesh Maheshwari, Jie Gao, Samir Das " Detecting wormhole attacks using Connectivity Information. " 0743-166X/07 IEEE Communication Society , IEEE INFOCOM 2007.
  10. William Stallings "Cryptography and Network Security", Fourth Edition, Pearson Education. ISBN 978-81-7758-774-6, 2006

Keywords

Ad hoc, AODV, MANET