Detection and Prevention of Network from Networks Attacks using EAODV

Vaibhav Suhane, Mahesh Gour, Sadhna K Mishra


The mobile ad hoc network (MANET) which has no centralized administration and no fix topology without infrastructure. In MANET nodes are communicated with own mutual trust. In MANET there are three types of protocol. these are Reactive, proactive and hybrid protocol .in MANET there are many network attacks like black hole, wormhole, Dos Attack etc. They dispute the network performance. Security is prime concern in MANET. In this paper we proposed new protocol EAODV.which is an enhanced AODV. Which will detect and prevent the network from wormhole, Black hole , DOS ,Man in middle, Eavesdropping and data modification. The performance of the EAODV protocol is compared with the existing AODV routing protocol with variation in Pause time and Node speed. Simulation is done in QualNet 5.0. simulator. The performances matrices are throughput, End to End delay and total packet loss.


AODV,QualNet5.0, Mobile Ad hoc Network


M. Frodigh, P. Johansson, and P. Larsson.“Wireless ad hoc networking: the art of networking without a network”, Ericsson Review, No.4, 2000, pp. 248-263.

N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location claims," in Proceedings of the 2nd ACM workshop on Wireless security. San Diego, CA, SA:ACM, 2003, 941313 1-10.

Qualnet Simulator Documentation. “Qualnet 5.0 User`s Guide”, Scalable Network Technologies, Inc., Los Angeles, CA 90045, 2006.

S. Kumar, V. S. Raghavan, and J. Deng, “Medium access control protocols for ad-hoc wireless networks: a survey." Ad-Hoc Networks, vol. 4, no. 3, pp. 326{358, May 2006.

K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad hoc networks," in Proceedings of the 10th IEEE International Conference on Network Protocols. IEEE Computer Society, 2002, 656326 78-89.

Y.-C. Hu, A. Perrig, and D. B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols," in WiSe '03: Proceedings of the 2nd ACM workshop on Wireless security. New York, NY, USA: ACM, 2003, pp. 30-40.

M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, 2004.

B. Wu, J. Chen, J. Wu, and M. Cardei, Network Theory and Applications.Springer, 2007, vol. 17, ch.A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks.

T. X. Brown, J. E. James, and A. Sethi, “Jamming and sensing of encrypted wireless ad hoc networks," in In Proc. of ACM MobiHoc, 2006.

H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38{47, Feb 2004.

S. Radosavac, A. A. C_ardenas, J. S. Baras, and G. V. Moustakides, “Detecting ieee 802.11 mac layer misbehavior in ad hoc networks: Robust strategies against individual and colluding attackers," J. Comput. Secur., vol. 15, no. 1, pp. 103-128, 2007.

R. Doomun, T. Hayajneh, P. Krishnamurthy, and D. Tipper, “Secloud: Source and destination seclusion using clouds for wireless ad hoc networks," in In Proceedings of the IEEE Symposium on Computer and Communications, 2009.

M. Khabbazian, H. Mercier, and V. K. Bhargava, “Nis02-1: Wormhole attack in wire-less ad hoc networks: Analysis and countermeasure," in Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE, H. Mercier, Ed., 2006, pp. 1-6.

L. Zhou, Z.J. Haas, Cornell Univ., “Securing ad hoc networks,” IEEE Network, Nov/Dec 1999,Volume: 13, Page(s): 24-30, ISSN: 0890-8044.

X. Su and R. V. Boppana, “On mitigating in-band wormhole attacks in mobile ad-hoc networks," in Communications, 2007.ICC '07. IEEE International Conference on, R. V. Boppana, Ed., 2007, pp. 1136-1141.

L. Lazos and R. Poovendran, “Serloc: secure range-independent localization for wireless sensor networks," in WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security. New York, NY, USA: ACM, 2004, pp. 21-30.

L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput.Appl.,vol. 30, no. 1, pp. 308-330, 2007.

I. Khalil, S. Bagchi, and N. B. Shro_, “Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 51, no. 13, pp.3750-3772, 2007, 1276793.

Xia Wang, "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks ", 31st Annual International Computer Software and Applications Conference (C0MPSAC2007)0-7695-2870-8107,2007 IEEE.

Full Text: PDF


  • There are currently no refbacks.


All Rights Reserved © 2012 IJARCSEE

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.