Open Access
Subscription Access
Comparison of Different Methods to identify wormhole attacks in MANETS
A self-organized network without a central coordinator that changes its topology frequently is called a MANET. Two faraway nodes in a MANET seem to give an impression that they are situated close to each other due to the presence of malicious nodes referred to as worm-hole nodes. Due to the dynamic change in topology finding route is very difficult. Some nodes misbehave as they participate in route establishment phase but refuse to forward the data packets to conserve their own energy. In this paper we are going to compare three different methods (PT method, WAP method, TWOACK method) to detect misbehaving nodes. Simulation is carried through NS2 and the results of misbehaving nodes are compared and tabulated.
Keywords
Measures, DSR Protocol, PT Method, TWOACK Scheme, Wormhole Attack Prevention(WAP).
User
Font Size
Information
Abstract Views: 169
PDF Views: 4