Open Access Open Access  Restricted Access Subscription Access

Comparison of Different Methods to identify wormhole attacks in MANETS


Affiliations
1 Thiagarajar School of Management, Madurai 625005, India
2 Govt. Arts College, Melur, Madurai, India
 

A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the dynamic change in topology finding route is very difficult. Some nodes misbehave as they participate in route establishment phase but refuse to forward the data packets to conserve their own energy. In this paper we are going to compare three different methods (PT method, WAP method, TWOACK method) to detect misbehaving nodes. Simulation is carried through NS2 and the results of misbehaving nodes are compared and tabulated.

Keywords

Measures, DSR Protocol, PT Method, TWOACK Scheme, Wormhole Attack Prevention(WAP).
User
Notifications
Font Size

Abstract Views: 127

PDF Views: 4




  • Comparison of Different Methods to identify wormhole attacks in MANETS

Abstract Views: 127  |  PDF Views: 4

Authors

S. Seethalakshmi
Thiagarajar School of Management, Madurai 625005, India
K. Chitra Manikandan
Govt. Arts College, Melur, Madurai, India

Abstract


A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the dynamic change in topology finding route is very difficult. Some nodes misbehave as they participate in route establishment phase but refuse to forward the data packets to conserve their own energy. In this paper we are going to compare three different methods (PT method, WAP method, TWOACK method) to detect misbehaving nodes. Simulation is carried through NS2 and the results of misbehaving nodes are compared and tabulated.

Keywords


Measures, DSR Protocol, PT Method, TWOACK Scheme, Wormhole Attack Prevention(WAP).