CFP last date
20 January 2025
Reseach Article

Wormhole Detection and Removal Algorithm in Mobile Ad-hoc Networks using Enhanced Cluster based Technique

by Ankur Ratmele
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 30
Year of Publication: 2018
Authors: Ankur Ratmele
10.5120/ijca2018916683

Ankur Ratmele . Wormhole Detection and Removal Algorithm in Mobile Ad-hoc Networks using Enhanced Cluster based Technique. International Journal of Computer Applications. 179, 30 ( Mar 2018), 1-4. DOI=10.5120/ijca2018916683

@article{ 10.5120/ijca2018916683,
author = { Ankur Ratmele },
title = { Wormhole Detection and Removal Algorithm in Mobile Ad-hoc Networks using Enhanced Cluster based Technique },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2018 },
volume = { 179 },
number = { 30 },
month = { Mar },
year = { 2018 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number30/29166-2018916683/ },
doi = { 10.5120/ijca2018916683 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:56.783108+05:30
%A Ankur Ratmele
%T Wormhole Detection and Removal Algorithm in Mobile Ad-hoc Networks using Enhanced Cluster based Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 30
%P 1-4
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Networks (MANETs) are the collection of mobile devices which communicate through the wireless medium and do not have the central infrastructure. In unsecured MANETs, malicious nodes can form a private tunnel. Source sends packets to the destination and these packets follow the path through this tunnel, so the packets are captured by malicious nodes and do not reach the destination node. This is known as wormhole attack which is one of the well known security threat. The emphasis of my work is to detect wormhole attack, when there is more number of malicious nodes than non malicious nodes and develop a technique to prevent network from this wormhole attack. In this work, malicious nodes are detected on the basis of Packet Delivery Ratio (PDR). Packet Delivery Ratio is the ratio of number of packets sent to the number of packets received by the destination node. For performing the simulation of the various scenarios and analyzing the results we have used Ns-2 simulator.

References
  1. C.Siva Ram Murthy and B. S. Manoj. :Ad hoc wireless networks: Architecture and Protocols", Prentice Hall Publishers, May 2004, ISBN 013147023X.
  2. Mishra Amitabh, Nadkarni Ketan M., and Ilyas Mohammad. :Security in wireless Ad-hoc networks, the handbook of Ad hoc wireless network. Chapter 30: CRC PRESS Publisher, 2003.
  3. Y.-C. Hu, A. Perrig, D. B. Johnson.: Packet leashes: a defense against wormhole attacks in wireless networks; INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, Vol. 3, pp. 1976-1986, 2003.
  4. S.Capkun, L. Buttyan, J.-P. Hubaux.: SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks; Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks; 2003.
  5. Y-C Hu, A. Perrig, D. Johnson.: Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ; Proc. of WISE 2003, September 19, San Diego, California, USA, 2003.
  6. Korkmaz T.: Verifying Physical Presence of Neighbours against Replay-based Attacks in Wireless Ad Hoc Networks; Proc. International Conference on Information Technology: Coding and Computing 2005, ITCC 2005, pp. 704-709, 2005.
  7. M.Parsons and P.Ebinger.Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks.
  8. Roy, D.B., Chaki, R & Chaki, N.: A New Cluster-Based Wormhole Intrusion detection Algorithm for Mobile Ad Hoc Networks, International Journal of Network Security and its Applications (IJNSA), (2009).
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Detection Ad-hoc Networks