A defending of wormhole attack in wireless mesh network based on epigraph relay method and cooperative threading technique

نویسندگان

  • Akshita Rana
  • Deepak
چکیده

The proper management of wireless mesh network is a challenging task due to the mobility of node and velocity of node. All devices work in open channel area due to this security is very challenging task. Because due to mobility and open channel area possibility of threats and attacks are very high. On the basis of related work we found data wormhole attack is a serious attack in the environments of wireless mesh network. Various methods and applications are used for the prevention of wormhole attack, but all these method and process are not up to mark. Now we get idea about wormhole attack and prevention of wormhole attack. Here any method or process does not work in the level of network for the prevention of wormhole attack. In this dissertation we proposed a new model for prevention and detection of wormhole attack in wireless mesh network. The proposed model based on epigraph relay method (ERM) and cooperative threading process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sum-Rate Maximization Based on Power Constraints for Cooperative AF Relay Networks

In this paper, our objective is maximizing total sum-rate subject to power constraints on total relay transmit power or individual relay powers, for amplify-and-forward single-antenna relay-based wireless communication networks. We derive a closed-form solution for the total power constraint optimization problem and show that the individual relay power constraints optimization problem is a quad...

متن کامل

Performance Study of Untrusted Relay Network Utilizing Cooperative Jammer

Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...

متن کامل

Machine Learning Techniques for Wormhole Attack Detection Techniques in Wireless Sensor Networks

The wormhole attack in Wireless sensor networks (WSNs) decreases the network performance by dropping the No. of Packets. Many techniques have been proposed to so far reduce the impact of the wormhole attack by detecting and preventing it. But, related work indicates that no technique is perfect for every kind of circumstances of WSNs. Among the existing techniques, Watchdog technique has better...

متن کامل

A survey on wormhole attacks on Wireless Mesh Networks and its detection

Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...

متن کامل

A Study on Detecting Wormhole Attack in Wireless Ad hoc Networks

In multi hop wireless systems, such as ad hoc and sensor networks, mobile ad hoc network applications are deployed, security emerges as a central requirement. A particularly devastating attack is known as the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. Thes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012