International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 95 - Issue 13 |
Published: June 2014 |
Authors: Priyanka Sharma, H. P. Sinha, Abhay Bindal |
![]() |
Priyanka Sharma, H. P. Sinha, Abhay Bindal . Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks. International Journal of Computer Applications. 95, 13 (June 2014), 34-38. DOI=10.5120/16657-6637
@article{ 10.5120/16657-6637, author = { Priyanka Sharma,H. P. Sinha,Abhay Bindal }, title = { Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks }, journal = { International Journal of Computer Applications }, year = { 2014 }, volume = { 95 }, number = { 13 }, pages = { 34-38 }, doi = { 10.5120/16657-6637 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2014 %A Priyanka Sharma %A H. P. Sinha %A Abhay Bindal %T Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks%T %J International Journal of Computer Applications %V 95 %N 13 %P 34-38 %R 10.5120/16657-6637 %I Foundation of Computer Science (FCS), NY, USA
Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusion that the two remote nodes of a MANET are directly connected through nodes that appear to be neighbours, but are actually distant from one another. In this, a secret key is used for encryption and decryption of hello packets. Because of this, the only authentic node will remain in the network, non-authentic nodes (wormhole node) will be discarded. As a result, communication can take place only between the trusted nodes. So malicious node cannot enter into system and communication is secured.