CFP last date
20 January 2025
Reseach Article

An Approach to Detect Wormhole Attack in AODV based MANET

by Neha Dubey, Krishna Kumar Joshi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 114 - Number 14
Year of Publication: 2015
Authors: Neha Dubey, Krishna Kumar Joshi
10.5120/20049-2098

Neha Dubey, Krishna Kumar Joshi . An Approach to Detect Wormhole Attack in AODV based MANET. International Journal of Computer Applications. 114, 14 ( March 2015), 32-39. DOI=10.5120/20049-2098

@article{ 10.5120/20049-2098,
author = { Neha Dubey, Krishna Kumar Joshi },
title = { An Approach to Detect Wormhole Attack in AODV based MANET },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 114 },
number = { 14 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 32-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume114/number14/20049-2098/ },
doi = { 10.5120/20049-2098 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:52:48.675007+05:30
%A Neha Dubey
%A Krishna Kumar Joshi
%T An Approach to Detect Wormhole Attack in AODV based MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 114
%N 14
%P 32-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless networks are playing very important role in the present world. Mobile Ad hoc Networks (MANET) are the extension of the wireless networks. These networks are playing crucial role in the each and every field of the human life. They are used in those places where a simple wireless network cannot use. They play a significant role in real tile applications such as military applications, home applications wireless sensor applications etc. Due to their adaptive nature they are threatened by number of attacks such as Modification, Black Hole attack, Wormhole attack etc. Wormhole attack is one of the dangerous active attacks in the mobile Ad hoc Networks (MANET). In this paper a secure and efficient approach for the detection of the wormhole attack in the Mobile Ad Hoc Networks (MANET) is described. The proposed algorithm is implemented on a very popular on Adhoc On Demand Distance Vector known as AODV routing protocol. The beauty of this proposed algorithm is that it not only identifies the wormhole attacker node but also confirm it as well. To simulate the effect of the proposed work the popular NS 2(Network Simulator 2) is used.

References
  1. Marianne A. Azer, , IEEE, Sherif M. El-Kassas, and Magdy S. El-Soudani, " An Innovative Approach for the Wormhole Attack Detection and Prevention In Wireless Ad Hoc Networks", in IEEE Conference, 2010
  2. Kuldeep Sharma, Dr. G. Mahadevan, "Advance Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", Int. J. on Recent Trends in Engineering & Technology, Vol. 05, No. 01, Mar 2010
  3. Vih-chun-hu, Adrian Perrig, David B. Johnson, "Packet Leashes: A defense against Wormhole Attack in Wireless Mobile AD-HOC network", Rice University Department of computer science. Technical Report TRO1-384 December 17, 2010
  4. Khalil "WAP:Wormhole Attack Prevention Algorithm in Mobile AD-HOC network", Sensor network, Ubiquitous and Trustworthy Computing 2010
  5. A. A. Pirzada and C. McDonald, "Detecting and evading wormholes in mobile ad-hoc wireless networks", International Journal of Network Security, 3(2):191C202,
  6. P. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks", Proceedings of MobiHoc, 2011
  7. S. Capkun, M. Cagalj, and M. Srivastava, "Secure localization with hidden and mobile base stations", Proceedings of the 25th IEEE International Conference on Computer Communications Societies (INFOCOM '06), Barcelona, Spain, April 2011
  8. Saurabh Gupta, Subrat Kar, S Dharmaraja, WHOP: Wormhole Attack Detection Protocol using Hound Packet, 2011 International conference on innovations in information technology.
  9. Xia Wang ,Ritesh Maheshwari, Jie Gao, Samir R Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information", in IEEE INFOCOM 2011 Alaska. .
  10. JohnnyWong "An End-to-end Detection ofWormhole Attack in Wireless Ad-hoc Networks" Department of Computer Science Iowa State University Ames, Iowa 2011.
  11. Pushpendra Niranjan, Prashant Srivastava, Raj kumar Soni, Ram Pratap "Detection of Wormhole Attack UsingHop-Count And Time Delay Analysis" information Technology, LNCT (RGPV) Bhopal, India International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 ISSN 2250-3153
  12. Subrat Kar, S Dharmaraja, " WHOP: Wormhole Attack Detection Protocol using Hound Packet" Dept CSE Indian Institute of Technology Delhi Hauz Khas, New Delhi , 2011 International Conference on Innovations in Information Technology.
  13. Harbir Kaur, Sanjay Batish & Arvind Kakaria, "An Approach To Detect The Wormhole Attack In Vehicular Adhoc Networks" International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248?9738 Volume?1, Issue?4, 2012
  14. L. Sudha Rani , R. Raja Sekhar (Ph. D) , "DETECTION AND PREVENTION OF WORMHOLE ATTACK IN STATELESS MULTICASTING",International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012 1 ISSN 2229-5518
  15. Jyoti Thalor, Ms. Monika, "Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks" Department of Computer Science &Applications Kurukshetra University, Kurukshetra Haryana, India, International Journal of Advanced Research in Computer Science and Software Engineering 3(2), February - 2013, pp. 137-142
  16. Dr. A. Francis Saviour Devaraj, Vandana C. P "MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET" Scholar, Department of Information Science Engineering Oxford College of Engineering, Bangalore, India International Journal of Security, Privacy and Trust Management ( IJSPTM) Vol 2, No 3, June 2013
  17. Mahesh Gour, Amrit Sumanyand Ankur Kulhar, " Detection and Prevention of Wormhole Attack in ALARM Protocol (MANETs)" HCTL Open Int. J. of Technology Innovations and Research HCTL Open IJTIR, Volume 4, July 2013 e-ISSN: 2321-1814 ISBN (Print): 978-1-62776-132-1
  18. Sivakumar , Dr. G. Selvaraj,"Analysis of Worm Hole Attack In MANET And Avoidance Using Robust Secure Routing Method" International Journal of Advanced Research in Computer Science and Software Engineering 3(1), January - 2013, pp. 235-242 ©
  19. N. Satheesh, Dr. K. Prasadh, " Analysis and Parameterized Evaluation of Impact of Wormhole Attack Using AODV Protocol in MANET", International Journal of Advanced Research in Computer Science and Software Engineering 3(9), September - 2013, pp. 708-713
  20. A. VANI, D. Sreenivasa Rao, "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks", International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 3 No. 6 June 2013
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV RREP RREQ Wormhole