Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs

被引:0
作者
Teotia, Vinesh [1 ]
Dhurandher, Sanjay Kumar [2 ]
Woungang, Isaac [3 ]
Obaidat, Mohammad S. [4 ,5 ]
机构
[1] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, Delhi, India
[2] Univ Delhi, Div Informat Technol, NSIT, Delhi 110007, India
[3] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
[4] Monmouth Univ, Dept Comp Sci & Software Engn, IEEE, West Long Branch, NJ 07764 USA
[5] Monmouth Univ, Dept Comp Sci & Software Engn, SCS, West Long Branch, NJ USA
来源
2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) | 2015年
关键词
Wormhole attacks; routing; Cell-based Open Tunnel Avoidance (COTA); location aided routing; mobile ad hoc networks (MANETs); HOC; ATTACKS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Mobile ad hoc networks (MANETs) are infrastructureless. As such, they are subject to various types of security attacks if malicious nodes are present in the network. One of such attacks is the wormhole attack. In an earlier work, a scheme (called Cell-based Open Tunnel Avoidance (COTA)) was proposed to address this problem, which consisted in a mechanism for detecting and classifying the wormhole attacks in the network. In this paper, the COTA mechanism is implemented on the location aided routing protocol (LAR1), leading to the so-called COTA-LAR1 scheme. Simulation results are provided, showing that the COTA-LAR1 scheme is an improved secured routing scheme against wormhole attacks in MANETs, in terms of packet delivery ratio, throughput, and end-to-end delay, chosen as performance metrics.
引用
收藏
页码:7036 / 7040
页数:5
相关论文
共 11 条
[1]  
Dhurandher S. K., 2012, 2012 IEEE Workshops of International Conference on Advanced Information Networking and Applications (WAINA), P472, DOI 10.1109/WAINA.2012.85
[2]  
Hu YC, 2003, IEEE INFOCOM SER, P1976
[3]  
Jain Mohit, 2009, Proceedings of the 2009 International Conference on Advances in Computing, Control, & Telecommunication Technologies (ACT 2009), P555, DOI 10.1109/ACT.2009.141
[4]   Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks [J].
Khabbazian, Majid ;
Mercier, Hugues ;
Bhargava, Vijay K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) :736-745
[5]   Location-Aided Routing (LAR) in mobile ad hoc networks [J].
Ko, YB ;
Vaidya, NH .
WIRELESS NETWORKS, 2000, 6 (04) :307-321
[6]  
Lazos L, 2005, IEEE WCNC, P1193
[7]  
Nouri M., 2011, INT C MOD SIM APPL O, P1
[8]  
Vani A., 2011, INT J COMPUTER SCI E, V3, P23
[9]  
Venkataraman R., 2009, INT J RECENT TRENDS, V1
[10]   Defending against wormhole attacks in mobile ad hoc networks [J].
Wang, Weichao ;
Bhargava, Bharat ;
Lu, Yi ;
Wu, Xiaoxin .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04) :483-503