CFP last date
20 December 2024
Reseach Article

Degradation of Ad-hoc Network Performance under Wormhole Attack

by Vishal Pahal, Susheel Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 13
Year of Publication: 2012
Authors: Vishal Pahal, Susheel Kumar
10.5120/7687-0997

Vishal Pahal, Susheel Kumar . Degradation of Ad-hoc Network Performance under Wormhole Attack. International Journal of Computer Applications. 49, 13 ( July 2012), 25-29. DOI=10.5120/7687-0997

@article{ 10.5120/7687-0997,
author = { Vishal Pahal, Susheel Kumar },
title = { Degradation of Ad-hoc Network Performance under Wormhole Attack },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 13 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 25-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number13/7687-0997/ },
doi = { 10.5120/7687-0997 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:11.013541+05:30
%A Vishal Pahal
%A Susheel Kumar
%T Degradation of Ad-hoc Network Performance under Wormhole Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 13
%P 25-29
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An ad-hoc network is self-organizing and adaptive. Networks are formed on-the-fly; devices can leave and join the network during its lifetime, devices can be mobile within the network, the network as a whole may be mobile and the network can be deformed on the-fly. In wireless ad hoc networks, nodes depend upon other node to forward packets for each other to communicate beyond their transmission range. Ad-hoc network are very useful in war , accidental , military services, flood , earthquake situations and also in normal conditions. . In multihop wireless Ad-hoc networks, cooperation between nodes to route each other's packets exposes these nodes to a wide range of security attacks. Therefore, networks are vulnerable to various attacks launched through compromised nodes because malicious nodes can easily participate in the networks. . One of such type of attack is Wormhole Attack. It is a tunnel based attack in which a pair of nodes forms a tunnel with false identification [1]. In wormhole attacks, one malicious node tunnels packets from its location to the other malicious node. . If source node chooses this fake route, malicious nodes have the option of delivering the packets or dropping them. In this paper we have simulated the wormhole attack in wireless Ad-hoc networks & Manet's. And then we evaluated & discussed the impact on the network by comparing the results with secure network without wormhole attack and unsecure network with wormhole attack. In this way, the impact of the wormhole attack on the network performance is analyzed. Impact of wormhole attack on the network is shown using tool Ns-2. 34. The implementation is done with the DYMO routing protocol .

References
  1. A. Ephremides, J. E. Wieselthier and D. J. Baker, "A design concept for reliable mobile radio networks with frequency hopping signaling," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 56-73.
  2. Phuong, T. V. , N. T. Canh, and Young-Koo. Lee, S. Lee, and H. Lee, "Transmission Time-based Mechanism to Detect wormhole Attacks", IEEE Computer society, 2007, pp. 172-178.
  3. S. Capkun, L. Buttyan, and J. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks," In Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks (ACM SASN), Fairfax, USA, Oct. 2003
  4. Monis Akhlaq, "Addressing Security Concerns of Data Exchange in AODV Protocol", World Academy of Science, Engineering and Technology, 2006, vol 16 , pp. 29-33.
  5. Mariannne. A. Azer, "Wormhole Attacks Mitigation", Sixth International Conference on Availability, Reliability and Security, 2011
  6. Pallavi Sharma, Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature", 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), May 27-29 2011, pp. 307-311.
  7. Maria Alexandrovna Gorlatova "Review of Existing Wormhole Attack Discovery Techniques" A Contractor Report at DRDC Ottawa ,pp 1-23,August 2006.
  8. Majid Khabbazian," Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks", IEEE Transactions On Wireless Communications, vol. 56, no. 7, pp. 1536-1276 , 2009.
  9. Yih-Chun Hu, "Wormhole Attacks in Wireless Networks", IEEE Journal On Selected Areas In Communications, VOL. 24, NO. 2, pp- 370-380, FEBRUARY 2006.
  10. Jong-Pyng Li," Priority Based Real-Time Communication for Large Scale Wormhole Networks Parallel Processing Symposium, 1994. Proceedings. , Eighth International. pp-433-438.
  11. Sergio A. Felperin, Prabhakar Raghavan, Eli Upfal: " A Theory of Wormhole Routing in Parallel Computers". IEEE Trans. Computers vol. 45, no. 6: 704-713 (1996)
  12. Reshmi Maulik1 and Nabendu Chaki2 ," A Study on Wormhole Attacks in MANET ",International Journal of Computer Information Systems and Industrial Management Applications ISSN 2150-7988 vol. 3 ,pp. 271-279,2011
  13. Y. -C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wireless Networks, vol. 11, no. 1-2, pp. 21–38, 2005.
  14. Khin Sandar Win. "Analysis of Detecting Wormhole Attack in Wireless Networks", World Academy of Science, Engineering and Technology 48 ,2008, pp. 422-428.
  15. Shang-Ming Jen, Chi-Sung Laih, Wen-Chung Kuo . "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", Sensors, Vol. 9, Issue 6, Pages: 5022-5039, 2009
  16. D. Djenouri, O. Mahmoudi, D. Llewellyn-Jones, M. Merabti, "On Securing MANET Routing Protocol Against Control Packet Dropping". In IEEE International Conference on Pervasive Services, 2007, pp. 100-108
  17. M. S. Sankaran, S. Poddar, P. S. Das, S. Selvakumar. "A Novel Security model SaW: Security against Wormhole attack in Wireless Sensor Networks". In Proceedings of International Conference on PDCN, (2009).
  18. Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:"An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks". ICNSC,2010, pp. : 366-371,.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Tunnel Wireless Cryptography Impact on network performance Network throughput