Modified AODV Routing Protocol in Order to Defend Wormhole Attack
Paper ID : 1279-IST
1hossein Gharaee *, 2Farid Mohammadi
1ICt security dep, ITRC
Mobile Ad_hoc Networks (MANET) are vulnerable to both active and passive attacks. In Wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. Such wormhole attacks result in a false route with fewer. If source chooses this fake route, malicious nodes have the option of sniff, modify, selectively forward packets or drop them. Existing solution to defend wormhole attacks, such as SECTOR, Packet Leashes, DelPHI, directional antenna. These solutions require special hardware or strict synchronized clocks or cause message overhead, or generate false-positive alarms. A novel approach MAODV: Modified AODV is proposed to defend wormhole attacks, launched in AODV. The proposed approach is based on weight per hop. Each node in network has its own weight, given by administration due to trusty, power capability. Sum of weight will not be exceeded from 100. Whenever a source node want to send a traffic to destination, put its minimum weight in RREQ packet to constitute the route. The destination node is selected the route, that its weight is close to destination announcement weight. Since in proposed method we are not using any special hardware and encryption technic, it will have less overhead and delay in compare to other technique. The effectiveness of the propose mechanism is evaluated using ns2 network simulator.
Mobile Ad_hoc ,MANET, attack, routing, Wormhole attack, AODV, NS2;