2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013) (2013)
April 6, 2013 to April 7, 2013
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/ACCT.2013.68
Security is an essential service for wired and wireless network communication. This work concerned with a particularly sever security attack that affects the ad hoc networks routing protocols, called "wormhole attack". There are many solutions to detect and prevent this attack like packet leashes, cluster base, hop count analysis etc., but none of them is perfect solution. This paper contains a proposal for new technique for wormhole avoidance. Proposed technique has been implemented with NS2 simulator over the DSR protocol. This technique for wormhole avoidance addresses the malicious nodes and avoids the routes having wormhole nodes without affecting the overall performance of the network. The performance metrics used for evaluating network performance are jitter, throughput and end to end delay. The performance of proposed techniques is good.
jitter, mobile ad hoc networks, routing protocols, telecommunication network routing, telecommunication security, telecommunication services
Y. Singh, A. Khatkar, P. Rani, Deepika and D. D. Barak, "Wormhole Attack Avoidance Technique in Mobile Adhoc Networks," 2013 Third International Conference on Advanced Computing & Communication Technologies (ACCT 2013)(ACCT), Rohtak, 2013, pp. 283-287.