We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Energy Efficient Approach for Wormhole Detection and Prevention

by Gaurav Sharma, Mehajabeen Fatima
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 76 - Number 17
Year of Publication: 2013
Authors: Gaurav Sharma, Mehajabeen Fatima
10.5120/13342-0921

Gaurav Sharma, Mehajabeen Fatima . An Energy Efficient Approach for Wormhole Detection and Prevention. International Journal of Computer Applications. 76, 17 ( August 2013), 38-42. DOI=10.5120/13342-0921

@article{ 10.5120/13342-0921,
author = { Gaurav Sharma, Mehajabeen Fatima },
title = { An Energy Efficient Approach for Wormhole Detection and Prevention },
journal = { International Journal of Computer Applications },
issue_date = { August 2013 },
volume = { 76 },
number = { 17 },
month = { August },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume76/number17/13342-0921/ },
doi = { 10.5120/13342-0921 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:48:42.384628+05:30
%A Gaurav Sharma
%A Mehajabeen Fatima
%T An Energy Efficient Approach for Wormhole Detection and Prevention
%J International Journal of Computer Applications
%@ 0975-8887
%V 76
%N 17
%P 38-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now these day multi- hop wireless Ad-hoc network suffer from number of security threat namely wormhole attack. Wormhole attacks make an tunnel that attracted all the communication over the network in order either scan message over packet , drop the packet or for unwanted consumption of battery power of Ad-hoc network. In this paper a wormhole detection and prevention scheme has been proposed in order to save battery power. Proposed scheme upgrade neighbor node information scheme for wormhole detection by encapsulating hop count scheme. Basically in neighbor node scheme there is problem for selection of threshold value. Proposed methodology overcomes that problem by using hop count scheme under that decision. Recently research will focus over wormhole detection and prevention but existing technique having very higher false negative rate and battery consummation along with overloaded control packet and routing overhead. In this paper a wormhole detection and prevention technique has been proposed which is based neighbour node and hop count method.

References
  1. Maulik, R, Chaki, N. "A comprehensive review on wormhole attacks in MANET" IEEE 2010, Page 233-238.
  2. Jian Yin, Sanjay Madria, "A hierarchical secure routing protocol against black hole attack in sensor networks", IEEE SUTC, 2006.
  3. Xiangyang Li "Wireless Ad Hoc and Sensor Networks: Theory and Applications" Cambridge University Press 978-0-521-86523-4
  4. Sebastian Terence J , "Secure Route Discovery against Wormhole Attack in Sensor Networks using Mobile Agents", IEEE 2011, pp 110-115.
  5. C. Perkins, E. Belding-Royer, "Ad hoc On-Demand Distance Vector (AODV) Routing," The Internet Society 2003.
  6. Sang-min Lee, Keecheon Kim "An Effective Path Recovery Mechanism for AODV Using Candidate Node" springerlink, vol. 4331/2006, 2006.
  7. Mahajan, V. ;Natu, M. ; Sethi, A. , "Analysis of wormhole intrusion attacks in MANETS", IEEE 2008, Page 1-7.
  8. Keer, S. ;Suryavanshi, A. , "To prevent wormhole attacks using wireless protocol in MANET" IEEE 2010, Page 159-163.
  9. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, "A secure routing protocol for ad hoc networks," in Proc. of IEEE ICNP, 2002.
  10. Dang QuanNguyen ; Lamont, L. , "A Simple and Efficient Detection of Wormhole Attacks", IEEE 2008, Page 1-5.
  11. KatrinHoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  12. KanikaLakhani, Himanibathla, Rajesh Yadav "A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET" IJCSNS International Journal of Computer Science and Network Security, vol. 10 No. 5, May 2010.
  13. Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE,2012
Index Terms

Computer Science
Information Sciences

Keywords

Adhoc network Wormhole Attack Statistics and Graph Based scheme AODV