Detecting and Avoiding of Worm Hole Attack and Collaborative Blackhole attack on MANET using Trusted AODV Routing Algorithm

A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot of attack but introduce only collaborative black hole and worm hole attack. A group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. When two malicious node is create a tunnel is called worm hole attack. This paper instigate to detect and avoided of worm hole attack and collaborative black hole attack using trusted AODV routing algorithm.


System Architecture

Project Overview This paper works as, When two malicious node is create a tunnel is called worm hole attack cognizing and Avoiding of Worm Hole Attack and CollaborativeBlackhole assault on MANET utilizing Trusted AODV Routing Algorithm.
System Requirements
Hardware Requirement
Main processor : Pentium IV processor 1.13 GHz
Hard disk capacity : 40GB
Cache memory : 512 MB
Monitor : LG Digital Color Monitor
Keyboard : Samsung
Mouse : Logitech

Software Requirement
Operating system : Fedora 8 (linux)
Scripting language : Network Simulator 2.33
Protocol developed : C++
Scripting : Tool Command Language

Sample Code
{set i 0} {$i < $val(nn) } { incr i } { set node_($i) [$ns node] } set udp [new Agent/UDP] $ns attach-agent $node_(0) $udp set cbr [new Application/Traffic/CBR] $cbr set packetSize_ 1024 $cbr set interval_ 0.1 $cbr attach-agent $udp set null [new Agent/Null] $ns attach-agent $node_(1) $null $ns connect $udp $null $ns at 2.0 "$cbr start" $ns at 10.0 "$cbr stop" $ns at 2.0 "$ns trace-annotate \"Sender sends the data to the receiver through the selected router which is attacker\"" $ns at 2.1 "$ns trace-annotate \"Attacker 3 and 8 forms wormhole\"" set udp [new Agent/UDP] $ns attach-agent $node_(1) $udp set cbr [new Application/Traffic/CBR] $cbr set packetSize_ 1024 $cbr set interval_ 0.1 $cbr attach-agent $udp set null [new Agent/Null] $ns attach-agent $node_(3) $null $ns connect $udp $null $ns at 3.0 "$cbr start" $ns at 10.0 "$cbr stop" $ns at 3.0 "$ns trace-annotate \"Attacker forwards the data to Attacker 8 which does not forward the data to receiver\""

Above code explains how warm hole attack will occur,while sending data from source to destination,sender choose a alternative path(wormhole tunnel) to send data to destination instead of actual path this time packet loss will occur.