CFP last date
20 December 2024
Reseach Article

Detection of Wormhole Attack using Round Trip Time and Node Workload

by Bharti Patidar, Reshma Rai Shivhare
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 11
Year of Publication: 2015
Authors: Bharti Patidar, Reshma Rai Shivhare
10.5120/19707-1459

Bharti Patidar, Reshma Rai Shivhare . Detection of Wormhole Attack using Round Trip Time and Node Workload. International Journal of Computer Applications. 112, 11 ( February 2015), 1-4. DOI=10.5120/19707-1459

@article{ 10.5120/19707-1459,
author = { Bharti Patidar, Reshma Rai Shivhare },
title = { Detection of Wormhole Attack using Round Trip Time and Node Workload },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 11 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number11/19707-1459/ },
doi = { 10.5120/19707-1459 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:09.966547+05:30
%A Bharti Patidar
%A Reshma Rai Shivhare
%T Detection of Wormhole Attack using Round Trip Time and Node Workload
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 11
%P 1-4
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network is one of the most popular research area in wireless network. The properties of node mobility, data relying and administrative control less configuration of network keep attracting researchers. In this network routing is a backbone of control and data transmission methodology, therefore efficient and secure routing techniques is desired. In order to find solution for security and performance in such networks, the proposed study includes the investigation of wormhole attack and their detection techniques. In addition of that, a new technique of wormhole avoidance is proposed which prevent attack deployment and their effect. It also improves the network performance in terms of the packet delivery ratio, throughput and end to end delay in the network.

References
  1. Isaac Woungang, Sanjay Kumar Dhurandher,IssaTraore, Mohammad S. Obaidat, "A Timed and Secured Monitoring Implementation Against Wormhole Attacks in AODV-Based Mobile Ad Hoc Networks", 2013 International Conference on Computer, Information and Telecommunication Systems (CITS).
  2. Zolidah Kasiran and Juliza Mohamad, "Throughput Performance Analysis of the Wormhole and Sybil Attack in AODV", ISBN: 978-1-4799-3724-0/14/$31. 00 ©2014 IEEE.
  3. Thi Ngoc Diep Pham, Chai Kiat Yeo, "Statistical Wormhole Detection and Localization in Delay Tolerant Networks", the 11th Annual IEEE CCNC - Security, Privacy and Content Protection 978-1-4799-2355-7/14/$31. 00 ©2014IEEE.
  4. Freek Verbeek and Julien Schmaltz, "A Decision Procedure for Deadlock-Free Routing in Wormhole Networks", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL. 25, NO. 8, AUGUST 2014 1935.
  5. Ahmed Louazani ,Larbi Sekhri,BouabdellahKechar, "A Time Petri Net model for Wormhole Attack Detection in Wireless Sensor Networks",2013 International Conference on Smart Communications in Network Technologies (SaCoNeT).
  6. M. S. Obaidat, I. Woungang, S. Dhurandher, and V. Koo, "Preventing packet dropping and message tampering attacks on aodv-based mobile ad hoc network," in Proc. of the IEEE Intl. Conference on Computer, Information and Telecom. Systems, Amman, Jordan. May 14-16, 2012.
  7. Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, "Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET", International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol. 2, No. 1, February 2012.
  8. Saurabh Gupta, Subrat Kar and S Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet", 2011 International Conference on Innovations in Information Technology.
  9. Vikas Solomon Abel, "Survey of Attacks on Mobile Ad hoc Wireless Networks", (IJCSE) ISSN: 0975-3397 Vol. 3 No. 2 Feb 2011.
  10. Rashid Hafeez Khokhar, MdAsriNgadi, Satria Mandala, "A Review of Current Routing Attacks in Mobile Ad Hoc Networks", 2008 International Journal of Computer Science and Security, volume (2) issue (3).
Index Terms

Computer Science
Information Sciences

Keywords

MANET Wormhole RTT Routing Attack Threshold Secure Routing.