Deployment of coordinated worm-hole peer in MANETs

Computer Science and Engineering, Muffakham Jah College of Engineering and Technology, Hyderabad, TELANGANA, India
DOI
10.7287/peerj.preprints.27516v1
Subject Areas
Computer Networks and Communications, Mobile and Ubiquitous Computing
Keywords
Worm hole peer, manets, Mac layer, AODV, Tunnel
Copyright
© 2019 Taranum et al.
Licence
This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Preprints) and either DOI or URL of the article must be cited.
Cite this article
Taranum F, Mahin SH, Yes. 2019. Deployment of coordinated worm-hole peer in MANETs. PeerJ Preprints 7:e27516v1

Abstract

With the enhancement in technical field of communication, efforts are made by the researchers to provide security. Security is dispensing protection and privacy to the system for the channeled data against any unwarranted access and refinements. MANET is a variant of wireless network used essentially by the dynamic devices with high motility and vulnerability. The distinctions like dynamic layout and curbed resources make them susceptible to miscellaneous kinds of threats. One such attack is wormhole which sneak and peep data with malicious intensions and operates either in coordinated or uncoordinated fashion. In its coordinated version, the malicious nodes coordinate their operations whereas in the uncoordinated version; they operate solitarily with the aim to decline the network performance. In this work, we aim to propose an algorithm for deployment of wormhole attack communicating with its peer through a tunnel. Planting of this attack in the network lays the foundation for developing successful strategies to mitigate their effects on the system.

Author Comment

This is a submission to PeerJ Computer Science for review.

Supplemental Information

PDR analysis for drop

PDR analysis for drop and normal scenario

DOI: 10.7287/peerj.preprints.27516v1/supp-2

Architecture of type of worm hole

DOI: 10.7287/peerj.preprints.27516v1/supp-6

Throughput for wormhole without drop

DOI: 10.7287/peerj.preprints.27516v1/supp-14

Architecture of wormhole peer-without drop

Architecuture of wormhole peer

DOI: 10.7287/peerj.preprints.27516v1/supp-15

Delay for wormhole without drop

Delay for no drop at wormpeer

DOI: 10.7287/peerj.preprints.27516v1/supp-16