Sei sulla pagina 1di 4

International Journal of Research in Advanced Technology - IJORAT

Vol. 1, Issue 8, SEPTEMBER 2016

MINIMIZATION OF MESSAGE DELAY BY USING MINIMUM


HOP COUNT TECHIQUE UNDER WORM HOLE ATTACKS,
K.Deepiga1, Dr.R.Kavitha2
M.E.(Network Engineerin),Dept.of IT,Velammal college of Engg &
Technology,Madurai.
Professor,Dept.of IT, Velammal College of Engg & Technology,Madurai

ABSTRACT - In a wireless network, security plays a major role and prevent from attacks. Wormhole attack
is the most severe attack on comparing others. Wormhole attack occurs when node sequence number exceeds
the destination sequence number, as the same time as transmitting the packets from source to destination and
thus it leads to delay the packets. The aim of this project work is to minimize the delay in transmission by
using the hop_ count detection technique. Hop count detection technique is used to find the minimum
distance path to send the packets. Hence, by using this progress message transmission without delay is done
efficiently.
Keywords: Network security, worm hole attacks, AODV, hop-count technique

I INTRODUCTION
notoriously weak security standard [6]. WPA was a

Wireless network

quick access and also to improving the security over


Wireless networking is a method, which
for

homes, telecommunications

it is used

networks and

enterprise (business) installations it has been used to


avoid the costly process. Which it is introducing
cables into a building, or as a connection between
some other locations. Wireless telecommunications
networks are also generally implemented and

WEP. Some hardware did not support WPA2 without


firmware upgrade.WPA2 uses an encryption device
that has been encrypting the network with a 256-bit
key. This type of

longer key length improves

security than WEP[2]. Many laptop and computers


have wireless cards had been pre-installed. The
ability to enter a network while mobile has great

administered using radio communication[1]. The

benefits. However, wireless networking is liable to

implementation of this network are also place at the

suffer from some security issues[8]. Hackers have

physical level. Examples of wireless networks

found wireless networks relatively easy

include cell phone networks,WLN, WSN.

observe, and even use wireless technology to gain

Wireless network security:

unauthorized access to data in a system into wired

Wireless security
unauthorized

access.The

is the prevention of
most

common

types

of wireless security are Wired Equivalent Privacy


(WEP) and Wi-Fi Protected Access (WPA). WEP is a

fail to

networks. As a result, it is very important to protect


the effective wireless system from the unauthorized
networks. Wireless Intrusion Detection Systems,
these two systems are commonly used to enforce
wireless security policies.

All Rights Reserved 2016 IJORAT

17

International Journal of Research in Advanced Technology - IJORAT


Vol. 1, Issue 8, SEPTEMBER 2016

II PROPSED ROUTING ALGORITHM


Hop Count Based Technique (Alternate Route)

selected route is chosen based on the routes reported

Network layer are generally affected by the

from the neighbors. If the difference between the

wormhole attacks. It also degrades the security

numbers of hops of the two routes is greater than a

services at the physical layer. Hop count technique is

certain value called the Threshold value", the sender

used to detect and isolate the wormhole attack at

will assume that route having a

physical layer. The sender node will initially have a

attack.This process is repeated by each node that lies

route to the destination node

and wishes to test

on the route when the route node is not greater than a

whether this route includes a wormhole or not.

certain value in a routes. The idea is that when a node

Detecting such wormholes is considered to be to a

that is close ,its next hop neighbor along with the

very great degree difficult. The sender will start by

route will be on the other side of the wormhole link.

discovering his one-hop neighbors. Based on the

If at least one of the perceive done-hop neighboring

presented with replies.The sender will check the

nodes are located within the transmission range of

routes that are used by these one-hop neighbors to

the node, the route from this neighbor to the target

the second hop neighbors with the route to the

node can be provided very different and thus the

destination. Node compares the length of a selected

wormhole will be detected.

wormhole

route with the one he has to the target node. The

Fig 1.Hop count technique


III.SIMULATION RESULTS
Packet loss is typically phenomenon by network

transit, such as wireless signals that are also light due

congestion. Packet loss can be done by a number of

to space or multi-path fading (in radio transmission),

other elements that can spoil or lose packets in


All Rights Reserved 2016 IJORAT

18

International Journal of Research in Advanced Technology - IJORAT


Vol. 1, Issue 8, SEPTEMBER 2016

faulty networking hardware. Packet loss and also


reduces the throughput.

Fig 3.Packet Delivery Ratio Comparison


End-to-End delay
The End-to-End delay is can
defined by using,
Fig 2.Packet loss

averaged delay over all data

packets that make it from the source to the


destination. The end-to-end delay it has been

Packet Delivery Ratio

calculated by using the transmission and reception


time duration. X axis determines number of nodes

The packet delivery ratio (PDR) is defines

and y axis determines End-to-End delay. The delay in

ratio between the successfully arrived packets

Secure AODV gets drastically decreased for 10 to 20

and the total number of packets sent. This shows that

nodes. It experiences less delay when compared to

how many packets were sent without any loss of

the delay that has been experienced in the Attack

packets. The Secure Ad hoc On-Demand distance

AODV[9].

as

Vector Routing has higher packet delivery ratio when


compared to the AODV routing protocol with
attacks. The AODV protocol which can be affected
by various types of attacks, one of the important
attack is the worm hole attack. The packet delivery
gets suddenly increased from 20 to 30 nodes for
secure AODV routing protocol. Due to this type of
attack, the packet delivery ratio gets decreased in
attack AODV.

Fig 4.End to End delay


All Rights Reserved 2016 IJORAT

19

International Journal of Research in Advanced Technology - IJORAT


Vol. 1, Issue 8, SEPTEMBER 2016

IV CONCLUSION

[4] Uwakwe Christian Chukwu,Satish M. Mahajan


[2014]," pratical implementation and Management of

In this proposed work minimization of the packet

Power SystemsWith V2G Facility for Smart-Grid

transmission delay even in the presence of worm hole

Applications".

attacks has discussed. This process is done using

[5] Yong Guan,Xinwen Fu, Riccardo Bettati, Wei

NETWORK SIMULATOR 2 and the performance

Zhao [2013]," Efficient Traffic Camouaging in

parameters are calculated and simulation results of

Mission-Critical QoS-guaranteed Networks".

output waveforms are obtained in the form of graph.

[6] Fadi Aloul, A. R. Al-Alia , Rami Al-Dalky

This system shows about the delay occurred at the

[2012]," Smart Grid and Security: unwanted Threats,

same time to transmitting the packets in the present

Vulnerabilities and Solutions".

of worm hole attacks and also found that these delay

[7] A. M. Pushpa, Trust Based Secure Routing in

can be minimized by using the hop count technique.

AODV Routing Protocol, IEEE, 2009.

On using hop counting method we can transmit the

[8] J. von Muller, I. Welch, and W. K. G. Sea,

packet efficiently.

Security threats and solutions in MANETs: A case


study using AODV and SAODV, J. Newt. Compute.

REFERENCES
[1] Zhuo LuWenye, Wang Cliff Wang, [2014],
"Hiding Trafffic To Minimizing Message Delay in
the Smart Grid under Jamming".

Appl., vol. 35, no. 4, pp. 12491259, Jul. 2012


[9]

L.

Pongee

and

X.

Zhenjiang,

Security

enhancement of AODV against internal attacks, Inf.


Sci. , pp. 584 586, Dec. 2010.
.[10] Akilesh Tripathi, Rajesh kumar, Modified

[2] Zoran Bojkovic, Bojan Bakmaz [2013]," Smart

Energy aware routing for Ad hoc network in

Grid Communications Architecture".

International journal of Distributed and parallel

[3] Wenye Wang ,Yi Xu, Mohit Khanna [2011]," A

systems,2012

survey on the communication architectures in smart


grid".

All Rights Reserved 2016 IJORAT

20

Potrebbero piacerti anche