Author : Abhijit Ghanshyam Raut 1
Date of Publication :17th May 2017
Abstract: Currently, wireless communication is becoming a major part of our day today life. Due to immense growth in the turf of wireless communications, different types of wireless networks such as Vehicular Ad-Hoc Networks (VANET), Mobile Ad-Hoc Networks (MANET) play a key role in communication systems. MANETs are the ones having free mobile nodes which can traverse throughout the system and can be a host, furthermore a router for transmitting /forwarding data packets to the distant node. As this system lacks centralized coordinator and is a self-organized, self-healing network without infrastructure, their adaptive nature and frequently changing topology it is more likely endangered to different security attacks such as black hole attack, wormhole attack etc. This paper emphases on providing a solution for secure transmission through the network. In this paper, we aimed at detecting wormhole attack in MANET using Fuzzy Inference System. As it is one of the dangerous active attacks on the network layer of MANET, in which data packet can get lost or replayed within the system by the wormhole nodes which can be more than a pair and are situated at different points within the system. To detect the wormhole nodes in the system, we have measured parameters such as No. of dropped packets, Reply packets, Forwarded packets to collect the data for analysis. The key objective of our paper is to detect the presence of wormhole attack in MANET. This is done by proposing soft computing algorithms such as Fuzzy Inference System (FIS). The suggested algorithm identifies wormhole nodes based on the above parameters.
Reference :
-
- Y. Hu, A. Perrig, and D. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks”, INFOCOM 2003. Twenty- …, vol. 00, no. C, 2003.
- S. Choi, D. Kim, D. Lee, and J. Jung, “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”, 2008 IEEE Int. Conf. Sens. Networks, Ubiquitous, Trust. Comput. (sutc 2008), pp. 343–348, Jun. 2008.
- H. Chiu and K. Lui, “DelPHI: wormhole detection mechanism for ad hoc wireless networks”, Wirel. Pervasive Comput. 2006 1st …, no. 852, 2006.
- M. R. Alam and K. S. Chan, “RTT-TC: A topological comparison based method to detect wormhole attacks in MANET”, Int. Conf. Commun. Technol. Proceedings, ICCT, pp. 991–994, 2010.Tutorial on Network Simulator v2.35.
- Anal Patel, Nimisha Patel, Rajan Patel, “Defending Against Wormhole Attack in MANET”, 2015 Fifth International Conference on Communication Systems and Network Technologies.
- S.Nivedha, S.Sankara Narayanan, “Detection and Prevention Of Wormhole Attack In MANET Using New Fresh Algorithm”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 5, May 2015.
- Vikas Kumar Upadhyay, Rajesh K ShukJa, Rajshree Dubey, “Detection And Prevention Of Wormholes In Mobile Ad-Hoc Networks Using Hybrid Methodology”, 978-1-4799-3064-7/14/$31. 00©20 14 IEEE