Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network

Abstract

Wireless Mesh Networks (WMNs) have emerging application because of its ad-hoc features, high internet bandwidth capability, and interoperable with various networks. However, all features of WMNs vulnerable due to their inadequate security services, and most of the existing techniques protect WMNs from single adversary node, but failed to protect colluding attacks. We proposed new Intrusion Detection (ID) technique, to protect the WMNs from wormhole attack (colluding attack) and following jellyfish and byzantine attacks. The proposed ID technique works based on different delays such as initial end-to-end packet delay, average end-to-end packet delay, and worst case end-to-end packet delay because wormhole attackers attract the network nodes by sending lower latency. Eventually, simulation results show that, our ID technique improves throughput of the network, when source and destination nodes detect and isolate (select new path which does not contain adversaries) the adversaries in wormhole attack and its following attacks.

Comments

  1. hello sir can you help in implementing gray hole attack , it would be helpfull if u do so or can u share any link which can help me , plz mail at amenable.aman@gmail.com

    ReplyDelete
  2. plz send me the tcl file for wormhole attack on manju.ojha90@gmail.com

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. hello sir can you help in implementing gray hole attack , it would be helpfull if u do so, plz send me the modifications required to implement wormhole attack on aodv in ns2 at svarikagoyal@gmail.com

    ReplyDelete

Post a Comment

Popular posts from this blog

NS2 Code for Blackhole Attack (multiple blackholes) in AODV Protocol

NS2 code for Rushing attacks (Jellyfish and Byzantine attacks)