Abstract

A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managing mobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks. The malicious node exploits these vulnerabilities to lunch attacks, especially when nodes have mobility and network do not have constant topology, like wormhole attack. This paper presents a lightweight technique that detects the wormhole attacks in MANET. In the proposed technique, the source node calculates the average sequence number of the reply (RREP) packets. If the sequence number of the corresponding node exceeds the calculated average value of the sequence number, then all traffic is discarded, and the node is marked as malicious. The proposed technique is less complex, power-efficient, and enhances network lifetime as more data packets are delivered to the destination node. This technique is validated through comprehensive simulations results in NS2.

Highlights

  • Mobile Ad-hoc Network is a wireless network without any infrastructure which includes mobile nodes that can move according to a pattern, and the topological structure of the network keeps on changing dynamically

  • All these features of mobile ad-hoc network (MANET) pave the way for a wide range of both active as well as passive attacks [3] that makes the issue of data security of critical importance

  • MANET proves to be handy on these occasions as it involves mobile nodes that build paths and communicate military communication services, short-range communications, etc. reason it is very cheap as compared to a wired network

Read more

Summary

Introduction

Mobile Ad-hoc Network is a wireless network without any infrastructure which includes mobile nodes that can move according to a pattern, and the topological structure of the network keeps on changing dynamically. MANET network is used for disaster management, rescue operations, communicate through this path formed by intermediate nodes These paths are formed using one of several standards or customized routing protocols following a specific mechanism linked to those protocols which can be categorized as proactive, reactive, and hybrid [2]. All these routing protocols might create a loophole in the security of the network due to their intrinsic properties. All these features of MANET pave the way for a wide range of both active as well as passive attacks [3] that makes the issue of data security of critical importance. An efficient and safe mechanism is required to ensure the maximum efficiency and security of transmission of packets in the path between nodes

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.