Open Access
Subscription Access
Open Access
Subscription Access
Implementation of a Cryptography Technique to Prevent Wormhole Attack
Subscribe/Renew Journal
Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.
Keywords
Cryptography, Wormhole Attack, Routing protocol, AODV, EAACK, Mobile Ad-hoc Network.
Subscription
Login to verify subscription
User
Font Size
Information
- Priyanka Goyal, Sahil Batra and Ajit Singh, “A Literature Review of Security Attack in Mobile Ad-Hoc Networks”, International Journal of Computer Applications, Vol. 9, No. 12, pp. 11-15, 2010.
- Elhadi M. Shakshuki, Nan Kang and Tarek R. Sheltami, “EAACK-A Secure Intrusion-Detection System for MANETs”, IEEE Transactions on Industrial Electronics, Vol. 60, No. 3, pp. 1089-1098, 2013.
- M. Kashap, S. Sing and R. Kumari, “Routing Issues and Challenges for MANET: A Review”, International Journal of Engineering Research and Technology, Vol. 2, No. 10, pp. 23-34, 2013.
- F. Wu, “Economic Incentive Mechanisms for Wireless Ad Hoc Networks Principal Investigator”, Natural Science Foundation of China, Vol. 12, No. 3, pp. 23-35, 2012.
- A. Valarmozhi, M. Subala and V. Muthu, “Survey of Wireless Mesh Network”, International Journal of Engineering and Innovative Technology, Vol. 2, No. 6, pp. 338-242, 2012.
- Guoyou He, “Destination-Sequenced Distance Vector (DSDV) Protocol”, Technical Report, Networking Laboratory, Helsinki University of Technology, pp. 1-9, 2002.
- Ravinder Ahuja, Alisha Banga Ahuja and Pawan Ahuja, “Performance Evaluation and Comparison of AODV and DSR Routing Protocols in MANETs under Wormhole Attack”, Proceedings of 2nd IEEE International Conference on Image Information Processing, pp. 699-702, 2013.
- Nikhil Kumar, Vishant Kumar and Niti Kumar, “Comparative Study of Reactive Routing Protocols AODV and DSR for Mobile Ad hoc Networks”, International Journal of Computer Science and Information Technologies, Vol. 5, No. 5, pp. 6888-6891, 2014.
- Charles E. Perkins and Elizabeth M. Royer, “Ad-Hoc On- Demand Distance Vector Routing”, Technical Report, Sun Micro Systems Laboratories, Advanced Development Group, 1996.
- P. Ning and K. Sun, “How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols”, Technical Report, Department of Computer Science, North Carolina State University, 2003.
- D. Djenouri, O. Mahmoudi, D.L. Jones, M. Merabti, “On Securing MANET Routing Protocol against Control Packet Dropping”, Proceedings of IEEE International Conference on Pervasive Services, pp. 100-108, 2007.
- Donald Welch, “Wireless Security Threat Taxonomy”, Proceedings of IEEE Workshop on Information Assurance, pp. 261-265, 2003.
- C. Logeshwari and N. Gugha Priya, “Enhancing the Performance of MANETs using Period based Defense Mechanism”, Proceedings of International Conference on Simulations in Computing, pp. 174-182, 2014.
- S. Kavitha and E. Bharathi, “Reduction of Overhead Caused by Enhanced Adaptive Acknowledgement with Broadcast Algorithm for Mobile Ad-Hoc Networks”, International Journal of Computer Science and Technology, Vol. 5, No. 1, pp. 79-83, 2014.
- Shraddha Kamble, B.K Mishra and Rajesh Bansode, “Performance Enhancement of Intrusion Detection System Using Advance Adaptive EAACK for MANETs”, International Journal of Computational Engineering Research, Vol. 6, No. 6, pp. 45-52, 2016.
- Saima Zafar, Hina Tariq and Kanza Manzoor, “Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Computer Networks and Applications, Vol. 3, No. 2, pp. 25-31, 2016.
- Neerja Khatri and Arvind Kumar, “Analysing Performance of AODV in MANET: A Survey”, International Journal of Scientific and Engineering Research, Vol. 3, No. 6, pp. 1-4, 2012.
- Vivek Soi and B.S. Dhaliwal, “Performance comparison of DSR and AODV Routing Protocol in Mobile Ad hoc Networks”, International Journal of Computational Intelligence Research, Vol. 13, No. 7, pp. 229-231, 2017.
- Osama S. Faragallah, “An Enhanced Chaotic Key-Based RC5 Block Cipher Adapted to Image Encryption”, International Journal of Electronics, Vol. 99, No. 7, pp. 925-943, 2012.
- K. Vijaya Kumar and K. Somasundaram, “A Symmetric Multiple Random Keys (SMRK) Model Cryptographic Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, No. 11, pp. 10896-10903, 2015.
- Reena Chaudhary and Sunil Ahuja, “Implementing Cryptographic Algorithm in Term of Privacy in AODV Routing Protocol”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 6, No. 4, pp. 288-293, 2016.
- I.D. Chakeres and E.M. Belding Royer, “AODV Routing Protocol Implementation Design”, Proceedings of International Workshop on Wireless Ad hoc Networking, pp. 441-448, 2004.
- S. Capkun, L. Buttyan and J.P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks”, Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 21-32, 2003.
Abstract Views: 287
PDF Views: 0