Sweety Goyal’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (1)


Figure 1: Mobile Ad hoc Network 
Figure 2: Routing in AODV 
Figure 3: Wormhole Attack In Figure 3, source node S broadcasts an RREQ message to find its way to the destination node D. Node P and T receives RREQ message from S. Now when A receives RREQ (forwarded by P) it records and tunnels the RREQ to B. Now B forwards it to Q, Q forwards it to R and finally RREQ reaches D. Again RREQ reached D through another route S-T-U-V-W-X-Y-Z-D but the RREQ reaching D through the other path reaches faster. So D ignores the message received through S-T-U-V-W-X-Y-ZD route. Now D unicasts RREP through the route S-P-AB-Q-R-D. Thus all the data packets pass through the wormhole tunnel between the malicious nodes A and B [6].
Securing MANET against Wormhole Attack using Neighbor Node Analysis
  • Article
  • Full-text available

November 2013

·

359 Reads

·

14 Citations

International Journal of Computer Applications

Sweety Goyal

·

In Mobile Adhoc NETworks (MANETs), security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile adhoc networks in which a pair of colluding nodes make a tunnel using a high speed network. This paper focuses on providing a solution for secure transmission through the network and proposes a neighbor node analysis approach to identify wormhole attack and removes wormhole link in MANET. The proposed work is simulated using NS-2 and is analyzed using certain parameters such as throughput, loss rate, delay rate.

Download

Citations (1)


... Goel et al. [28] offered a solution for secure transmission throughout the network, in addition to proposing a neighbour node analysis approach to identify wormhole attacks and eliminate wormhole links in MANET. The work they had shown was simulated with NS-2, and specific characteristics like loss rate, throughput, and delay rate were used to do the analysis. ...

Reference:

Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc Network
Securing MANET against Wormhole Attack using Neighbor Node Analysis

International Journal of Computer Applications