Enhancement of Routes Performance in MANET Avoiding Tunneling Attack

MANET consists of spatially distributed autonomous small devices which creates a self connected environment. MANETs are originally motivated by military applications such as border surveillance and battlefield monitoring; today MANET can be used in many civilian applications, including home automati...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2012-01, Vol.42 (12)
Hauptverfasser: Niranjan, Pushpendra, Shrivastava, Manish, Khainwar, Rajpal Singh
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:MANET consists of spatially distributed autonomous small devices which creates a self connected environment. MANETs are originally motivated by military applications such as border surveillance and battlefield monitoring; today MANET can be used in many civilian applications, including home automation, healthcare, traffic control and habitat/environment monitoring. basic security services of MANET include authentication, confidentiality, integrity, anonymity and availability. However, in contrast to traditional wireless networks, in MANET [1], physical security of sensor nodes are not granted as they are usually deployed in remote and hostile environments. Therefore, attackers can easily compromise sensor nodes and use them to degrade the network's performance. Due to lack of physical security, the existing security solutions that are developed for traditional wireless networks cannot be directly employed in MANET. The security requirements of many protocols changed the situation and a more detailed research is currently underway to develop secure ad hoc routing protocols. MANETs are extremely vulnerable to attacks due to their dynamically changing topology, absence of conventional security infrastructures and open medium of communication, which, unlike their wired counterparts, cannot be secured. This paper focuses on wormhole based attacks and their detection mechanisms are analyzed. In this paper we specifically considering Tunneling attack which do not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting suspicious routes as in previous methods, we implement a new method which detects the attacker nodes and works without modification of protocol, using a hop-count and time delay analysis from the viewpoint of users without any special environment assumptions. The proposed work is simulated using OPNET-14, and results showing the advantages of proposed work.
ISSN:0975-8887
0975-8887
DOI:10.5120/5746-7951