A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS

Authors

  • Anuja Sanjay Divekar Flora Institute of Technology, Pune, Maharashtra
  • Deepali Borade Flora Institute of Technology, Pune Maharashtra
  • Vivek Bugad Bharati Vidyapeeth’s College of Engineering ,Pune, Maharashtra, India.

DOI:

https://doi.org/10.24297/ijct.v14i3.1998

Keywords:

Fast Reroute, Failure Resilience, Local Rerouting, Wormhole attack, RTT, AOMDV, harmful node.

Abstract

It has been observed that IP networks are vulnerable to many kinds of attacks. Among the various attacks possible in  IP networks wormhole attack is one which is treated as a very severe attack. In LOLS, multiple failures are handled but network attack is not detected. LOLS cannot handle any kind of attack and this is the reason why we are working on wormhole attack and its detection by using AOMDV algorithm. In this attack a harmful node records packets at one end in the network and tunnels them to another harmful node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and  avoids the wormhole attack while data transfer . In this paper one mechanism is used, which is based on the total round trip time (RTT) of current route and the average round trip times This mechanism works for both mobile ad hoc networks and wireless ad hoc networks.

Downloads

Download data is not yet available.

Author Biographies

Anuja Sanjay Divekar, Flora Institute of Technology, Pune, Maharashtra

PG Fellow, Department of Computer Network Engineering

Deepali Borade, Flora Institute of Technology, Pune Maharashtra

Assistant Professor, Department of Computer Engineering

Vivek Bugad, Bharati Vidyapeeth’s College of Engineering ,Pune, Maharashtra, India.

PG Fellow, Department of Electronics –VLSI Design,

Downloads

Published

2015-01-08

How to Cite

Divekar, A. S., Borade, D., & Bugad, V. (2015). A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS. INTERNATIONAL JOURNAL OF COMPUTERS &Amp; TECHNOLOGY, 14(3), 5543–5549. https://doi.org/10.24297/ijct.v14i3.1998

Issue

Section

Research Articles