Wormhole Attack Detection By using trustbased Routing In Wireless Networks

Authors(1) :-V. Vasantharasi

Network security has been shown to be an effective approach to improve the wireless system performance. However many security issues impede its wide deployment. DAWN against wormhole in wireless network systems. The network has to avoid the attacker nodes. This can be achieved by trust based mechanism. Level Based upon the assigned trust value

Authors and Affiliations

V. Vasantharasi
Computer Science and Engineering, IFET College of Engineerimg, Villupuram, TamilNadu, India

Wireless network, DAWN algorithm

  1. S. Li, R. Yeung, and N. Cai, "Linear network coding," IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371–381, Feb. 2003.
  2. T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006.
  3. S. Biswas and R. Morris, "Opportunistic routing in multihop wireless networks," ACM SIGCOMM Comput. Commun. Rev., vol. 34, pp. 69–74, Sep. 2004.
  4. S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, "XORs in the air: Practical wireless network coding," in Proc. Conf. Appl., Technol., Archit. Protocols Comput. Commun., 2006, pp. 243–254.
  5. S. Chachulski, M. Jennings, S. Katti, and D. Katabi, "Trading structure for randomness in wireless opportunistic routing," in Proc. Conf. Appl., Technol., Archit. Protocols Comput. Commun., Aug. 2007, pp. 169–180.
  6. D. Dong, Y. Liu, X. Li, and X. Liao, "Topological detection on wormholes in wireless ad hoc and sensor networks," IEEE Trans. Netw., vol. 19, no. 6, pp. 1787–1796, Dec. 2011.

Publication Details

Published in : Volume 2 | Issue 2 | March-April 2017
Date of Publication : 2017-04-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 352-354
Manuscript Number : CSEIT172290
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

V. Vasantharasi, "Wormhole Attack Detection By using trustbased Routing In Wireless Networks", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 2, pp.352-354, March-April-2017.
Journal URL : http://ijsrcseit.com/CSEIT172290

Article Preview

Follow Us

Contact Us