IMPLEMENTATION OF A CRYPTOGRAPHY TECHNIQUE TO PREVENT WORMHOLE ATTACK
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff370e2a000000c23f020001000300
Mobile Ad-hoc network (MANET) is a decentralized type of wireless network. Due to its low cost of installation and easy maintenance, it is always self-configuring, infrastructure-less network of mobile devices associated with wirelessly. Every device in a MANET is free to move separately in any direction, and will therefore change its associations with the other devices regularly. Mobile ad-hoc network is similar kind of network where the device working as both sender and receiver. In this network, the device to device communication is usually has a routable networking environment on top of a Link Layer. Therefore, an intermediate host always becomes a part of communication. If the intermediate host is not trusted, then it can be modifying the messages transmitted to towards the destination host. A mechanism is necessary to improve the present communication technique in mobile ad-hoc network. So, we have used the cryptography technique. Then, the security in ad-hoc networks is investigate. The investigation leads to find a solution for wormhole attack. In this attacker, a group of attacker is deployed in the network and troubles the privacy and security of the network. Therefore, a solution with the cryptographic technique to prevent the information forward to the destination is proposed. The second contribution of the work is to prepare a technique by which the wormhole nodes are prevented in the network. The implementation of the proposed work is performed on the NS2 network simulator and the generated trace files are used for performance evaluation of the work. The performance of the proposed routing protocol evaluates the in conditions of end to end delay, throughput, packet delivery ratio, and packet drop ratio and also validate the solution for the proposed routing protocols performance is compared with the established EAACK and the AODV routing protocol. According to the experimental results, the performance of the proposed routing protocol is found optimum and adaptable for both security and performance issues in the network.

Authors
K Sundaravadivel
Thiru Govindasamy Government Arts College, India

Keywords
Cryptography, Wormhole Attack, Routing protocol, AODV, EAACK, Mobile Ad-hoc Network
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000001
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 10 , Issue: 1 , Pages: 1929-1935 )
Date of Publication :
March 2019
Page Views :
186
Full Text Views :
1

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.