Abstract

It has been observed that IP networks are vulnerable to many kinds of attacks. Among the various attacks possible in IP networks wormhole attack is one which is treated as a very severe attack. In LOLS, multiple failures are handled but network attack is not detected. LOLS cannot handle any kind of attack and this is the reason why we are working on wormhole attack and its detection by using AOMDV algorithm. In this attack a harmful node records packets at one end in the network and tunnels them to another harmful node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack while data transfer . In this paper one mechanism is used, which is based on the total round trip time (RTT) of current route and the average round trip times This mechanism works for both mobile ad hoc networks and wireless ad hoc networks.

Highlights

  • The internet plays an important role in our lives these days

  • We presented an idea of LOLS integrating, for controlling multiple failures in IP backbone networks and simple and efficient mechanism to detect and avoid wormhole attack by using AOMDV algorithm

  • The fundamental notion behind LOLS is to have packets carry a blacklist of degraded links came across the path that are to be escaped in order to guarantee loop-free forwarding

Read more

Summary

INTRODUCTION

The internet plays an important role in our lives these days. Providing nonstop service availability even with attacks is the foremost challenge for the service providers. The essential concept behind LOLS(Localized On-demand Link State Routing) is to have packets transmit a blacklist of degraded links come across along the path that are to be avoided in order to ensure loop-free forwarding. The packet’s blacklist is return to empty when the hop makes forward progress, i.e., the hop has a smaller path to the destination than any of the nodes navigated by the packet. With these simple steps, LOLS propagates the state of degraded links only when essential, and as far as necessary, and confirms loop-free delivery to all local destinations. When node is harmful node(attack by wormhole) the node as a source node and they send to destination ,to handle this problem we use AOMDV algorithm

RELATED WORK
PROPOSED SYSTEM
Algorithm
Wormhole Attack
End For
Expected Result
CONCLUSION AND FUTURE SCOPE
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.