INTERNATIONAL JOURNAL OF MODERN TRENDS IN ENGINEERING AND SCIENCE
Author’s Name : R.Asha, R.Prabavathi
Volume 01 Issue o1 January 2014
ISSN no: 2348-3121
Page no: 32-37
Abstract— Stealthy packet dropping is a suite of four attacks—misrouting, power control, identity delegation, and colluding collision—that can be easily launched against multi hop wireless Mesh networks. The main threats that violate the security criteria are known as security attacks. The major attack types of WMN are denial of service attack, impersonation attack and routing attack. All these attacks pose a great threat on user privacy protection, once disclosed to the attackers the information could compromise any user’s privacy. Through WMN, they access the public Internet in different roles and contexts for services like e-mails, e-banking, e-commerce and web surfing, and also intensively interact with their local peers for file sharing, teleconferencing, online gaming, instant chatting, etc. Obviously all these communications contains various kinds of sensitive user information. To overcome these malicious attacks in sensitive applications which contains large amount of user privacy information, WMNs need secured and privacy preserving protocol to ensure security and privacy. The protocol should also ensure the confidentiality, Integrity, authenticity, availability, non repudiation of network traffic and preserve the availability of communications from the malicious attackers.We present AODV protocol to mitigate these problems.
Keywords— AODV protocol, WMN, impersonation attack, non repudiation
 A.A.Pirzada and C. McDonald, “Establishing Trust in Pure Ad Hoc Networks,” Proc. Australasian Conf. Computer Science (ACSC ’04), Vol. 26, No. 1, pp. 47-54,(2004).
 S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness in Distributed Ad Hoc NeTworks,” Proc. ACM MobiHoc, pp. 80-91, (2002).
 Y.Huang and W. Lee, “A Cooperative Intrusion Detection System for Mesh Networks,” Proc. ACM Workshop Security of Mesh and Sensor Networks (SASN ’03), pp. 135-147,(2003).
 Y.C.Hu, A. Perrig, and D. Johnson, “Rushing Attacks and Defense in Wireless Mesh Network Routing Protocols,” Proc. ACM Workshop Wireless Security (WiSe ’03), pp. 30-40,(2003).
 Y.C.Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proc. IEEE INFOCOM, pp. 1976-986,(2003).
 S.J. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01), pp. 3201-3205,(2001).
 Q. Zhang, P. Wang, D. Reeves, and P. Ning, “Defending against Sybil Attacks in Sensor Networks,” Proc. Int’l Workshop Security in Distributed Computing Systems (SDCS ’05), pp. 185-191,(2005).
 C. Basile, Z. Kalbarczyk, and R.K. Iyer, “Neutralization of Errors and Attacks in Wireless Ad Hoc Networks, Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 518-527,(2005).
 B. Carbunar, I. Ioannidis, and C. Nita-Rotaru,”JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks,” Proc. ACM Workshop Wireless Security (WiSe ’04), pp. 11-20, (2004).
 B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks,” ACM Trans.