Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator
Security is the key concern, which allows safe communication between any two mobile nodes in an unfavorable environment. Wireless Ad Hoc can be unsecured against attacks by means of malicious nodes. Hence this study assesses the influence of wormhole attacks on Mobile Ad Hoc network (MANET) system t...
Published in: | 2021 IEEE 11th International Conference on System Engineering and Technology, ICSET 2021 - Proceedings |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2021
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123376284&doi=10.1109%2fICSET53708.2021.9612438&partnerID=40&md5=9d520457bf76dda60432462435fb5468 |
id |
2-s2.0-85123376284 |
---|---|
spelling |
2-s2.0-85123376284 Alsafwani N.; Ali M.A.M.; Tahir N.M. Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator 2021 2021 IEEE 11th International Conference on System Engineering and Technology, ICSET 2021 - Proceedings 10.1109/ICSET53708.2021.9612438 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123376284&doi=10.1109%2fICSET53708.2021.9612438&partnerID=40&md5=9d520457bf76dda60432462435fb5468 Security is the key concern, which allows safe communication between any two mobile nodes in an unfavorable environment. Wireless Ad Hoc can be unsecured against attacks by means of malicious nodes. Hence this study assesses the influence of wormhole attacks on Mobile Ad Hoc network (MANET) system that is evaluated and validated based on the QualNet simulator. The MANET performance is investigated utilizing the wormhole attacks. The simulation is performed on Mobile node's network layer and data link layer in the WANET (wireless Ad Hoc network). The MANET performance was examined using 'what-if' analyses too. Results showed that for security purposes, it is indeed necessary to assess the Mobile Ad Hoc node deployment. © 2021 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Alsafwani N.; Ali M.A.M.; Tahir N.M. |
spellingShingle |
Alsafwani N.; Ali M.A.M.; Tahir N.M. Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
author_facet |
Alsafwani N.; Ali M.A.M.; Tahir N.M. |
author_sort |
Alsafwani N.; Ali M.A.M.; Tahir N.M. |
title |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
title_short |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
title_full |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
title_fullStr |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
title_full_unstemmed |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
title_sort |
Evaluation of the Mobile Ad Hoc Network (MANET) for Wormhole Attacks using Qualnet Simulator |
publishDate |
2021 |
container_title |
2021 IEEE 11th International Conference on System Engineering and Technology, ICSET 2021 - Proceedings |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/ICSET53708.2021.9612438 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85123376284&doi=10.1109%2fICSET53708.2021.9612438&partnerID=40&md5=9d520457bf76dda60432462435fb5468 |
description |
Security is the key concern, which allows safe communication between any two mobile nodes in an unfavorable environment. Wireless Ad Hoc can be unsecured against attacks by means of malicious nodes. Hence this study assesses the influence of wormhole attacks on Mobile Ad Hoc network (MANET) system that is evaluated and validated based on the QualNet simulator. The MANET performance is investigated utilizing the wormhole attacks. The simulation is performed on Mobile node's network layer and data link layer in the WANET (wireless Ad Hoc network). The MANET performance was examined using 'what-if' analyses too. Results showed that for security purposes, it is indeed necessary to assess the Mobile Ad Hoc node deployment. © 2021 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1820775462843973632 |