期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2015
卷号:3
期号:9
DOI:10.15680/IJIRCCE.2015. 0309212 8642
出版社:S&S Publications
摘要:As mobile ad hoc network applications are deployed, security emerges as a central requirement. Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks. In this paper, we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Counter March Technique attempts to detect the intrusion action .The second technique namely Signature Based Verification Technique uses cryptographic co ncepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing protocol and analysis and simulations are performed in network simulator