Open Access   Article Go Back

The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis

J.Nithyapriya 1 , V. Pazhanisamy2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 139-141, Dec-2018

Online published on Dec 31, 2018

Copyright © J.Nithyapriya, V. Pazhanisamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: J.Nithyapriya, V. Pazhanisamy, “The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.139-141, 2018.

MLA Style Citation: J.Nithyapriya, V. Pazhanisamy "The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis." International Journal of Computer Sciences and Engineering 06.11 (2018): 139-141.

APA Style Citation: J.Nithyapriya, V. Pazhanisamy, (2018). The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis. International Journal of Computer Sciences and Engineering, 06(11), 139-141.

BibTex Style Citation:
@article{Pazhanisamy_2018,
author = {J.Nithyapriya, V. Pazhanisamy},
title = {The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {139-141},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=558},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=558
TI - The Indexing Strategy to Prevent Worm Holes in Manet - An Analysis
T2 - International Journal of Computer Sciences and Engineering
AU - J.Nithyapriya, V. Pazhanisamy
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 139-141
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

A temporary network of wireless mobile hosts without the assistance of standard administration form mobile ad hoc network (MANET). It has a dynamic topology because mobiles can enter and leave the network continuously. As MANET are wireless, dynamic and have no central administration, maintaining security in this network is difficult. The wireless nature of the communication makes nodes susceptible to various kinds of attacks such as black hole attack, worm hole attacks, DoS attacks etc. In present work, we aim at detection and prevention of the wormhole attack.

Key-Words / Index Term

MANET, Wormhole

References

[1] “Prevention of BLACK HOLE attack in MANET Using Indexing Algorithm”, Monika Shivhare1 , Prof. Praveen Kumar , Gautam Department of Computer Science and Engineering Sagar Institute of Research & Technology, Indore, India, IJESC,Volume 7,IssueNo. 5,2017
[2] Dhruvi Sharma, Vimal Kumar, Rakesh Kumar, " Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET " , Computational Intelligence in Data Mining. Volume 2. Volume 411 of the series “Advances in Intelligent Systems and Computing” pp 475-485. 10 December 2015, Springer.
[3] “Wormhole Attack Detection and Prevention in MANET Using Bait Scheme” Harjinder Kaur , Sukhjit Singh ,Department of Electronics Golden College, Gurdaspur, India,IJESC,Volume 7,IssueNo. 5,2017
[4] " Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach" , IEEE Systems Journal, Vol. 9, No. 1, March 2015
[5] “Security issues in MANET”,Rashid Sheikh,Mahakal Singh Chandel,Durgesh Kumar Mishra, 978-1-4244-7202-4/10 IEEE 2010.
[6] P. Basu, N. Khan, and T. D. C. Little, “A Mobility Based Metric for Clustering in Mobile Ad Hoc Networks,” in proceedings of IEEE ICDCSW‟ 01, pp. 413–18, Apr. 2001
[7] T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, pp. 1568- 1576, 2001.
[8] Wireless sensor Network security by Intrusion Detection in Energy Efficient Way by P N Rajitha et al,International Journal of Science Engineering and Technology Research,Vol 5,Issue 4, April 2016.
[9] Honeypot-An external layer of security against advanced attacks on Networks by Aaditya Jain et al. ,3rd International Conference on Recent Trends in Engineering Science and Management,April 2016. [10] A. P. K. Gagandeep, "Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review," International Journal of Engineering and Advanced Technology (IJEAT), vol. 1, no. 5, 2012