Volume 13, Number 4 (3-2017)                   JSDP 2017, 13(4): 109-120 | Back to browse issues page



DOI: 10.18869/acadpub.jsdp.13.4.109

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

gharaee H, mohammadi F. Modified AODV Routing Protocol in Order to Defend Wormhole Attacks. JSDP. 2017; 13 (4) :109-120
URL: http://jsdp.rcisp.ac.ir/article-1-212-en.html

assistant prf itrc
Abstract:   (169 Views)

Mobile Adhoc Networks ( MANET) are vulnerable to both active and passive attacks. In Wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If source chooses this fake route, malicious nodes have the option of sniff, modify, selectively forward packets or drop them. Existing solution to defend wormhole attacks, such as SECTOR, Packet Leashes, DelPHI, directional antenna. These solutions require special hardware or strict synchronized clocks or cause message overhead, or generate false-positive alarms. A novel approach MAODV: Modified AODV is proposed to defend wormhole attacks, launched in AODV. The proposed approach is based on weight per hop. Each node in network has its own weight, given by administration due to trusty, power capability. Sum of weight will not be exceeded from 100. Whenever a source node want to send a traffic to destination, put its minimum weight in RREQ packet to constitute the route. The destination node is selected the route, that its weight is close to destination announcement weight. Since no special hardware and no encryption technique are used, it will have less overhead and delay compare to other technique. The effectiveness of the propose mechanism is evaluated using ns2 network simulator.

Full-Text [PDF 2121 kb]   (68 Downloads)    
Type of Study: Research | Subject: Paper
Received: 2014/02/4 | Accepted: 2016/10/29 | Published: 2017/06/6 | ePublished: 2017/06/6

Add your comments about this article : Your username or email:
Write the security code in the box

Send email to the article author


© 2015 All Rights Reserved | Signal and Data Processing

Designed & Developed by : Yektaweb