We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET

by Kamini Singh, Gyan Singh, Arpit Agrawal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 20
Year of Publication: 2014
Authors: Kamini Singh, Gyan Singh, Arpit Agrawal
10.5120/16548-5825

Kamini Singh, Gyan Singh, Arpit Agrawal . A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET. International Journal of Computer Applications. 94, 20 ( May 2014), 1-5. DOI=10.5120/16548-5825

@article{ 10.5120/16548-5825,
author = { Kamini Singh, Gyan Singh, Arpit Agrawal },
title = { A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 20 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number20/16548-5825/ },
doi = { 10.5120/16548-5825 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:07.395888+05:30
%A Kamini Singh
%A Gyan Singh
%A Arpit Agrawal
%T A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 20
%P 1-5
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As in wireless network there is necessity of nodes cooperation to transfer packets from one node to another this property makes it vulnerable to wide range of attacks at different layer. Wormhole attack is one of the most destructive severe attack in which malicious node captures the traffic at particular location and tunnels it to another part of tunnel that is far away. In network security is generally equated by strong and feasible authentication and adopting methods of encryption and decryption. However this attack is hardly defeated as they do not use any additional effort to deploy nor create any extra packets. They simply capture packets then either drop them or replay in existing network, which make them to pass from any type of cryptographic checks and authentication Work done in this field have generally focused on use of additional hardware like directional antenna. In this paper, we present a cluster based counter-measure for the wormhole attack that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Simulation results shown on NS2 display the effectiveness of the proposed method for detecting and preventing wormhole attack.

References
  1. Ajay PrakashRai, VineetSrivastava and Rinkoo Bhatia "Wormhole Attack Detection in Mobile Ad Hoc Networks"in International Journal of Engineering and Innovative Technology (IJEIT), ISSN: 22773754 Volume 2,Issue 2, August 2012.
  2. AnjuGill,ChanderDiwaker "Adhoc Network Behavioral Study of Issues And Challenges In Mobile" IJARCSSE, Volume 2, Issue 5, May 2012.
  3. C. Siva Ram Murthy and B. S. Manoj"Ad Hoc Wireless Networks Architectures and Protocols".
  4. YudhvirSingh,AvniKhatkar, Prabha Rani, Deepika, and DheerDhwaj Barak "Wormhole Attack Avoidance Technique inMobileAdhoc Networks" in IEEE 978-0-7695-4941-5/12 $26. 00 (2013).
  5. M . Sookhak ,M. R. Eslaminejad, M. Haghparastand I. in FauziISnin "Detection of Wormhole in Wireless Adhoc networks" IJCST , Volume 2, Issue 7, October 2011.
  6. Moutushi Singh, Rupayan Das "A Survey of Different Techniques for Detectionof Wormhole Attack in Wireless Sensor Network" IJSER,Volume 3, Issue 10, October 2012.
  7. L. Sudha Rani, R. RajaSekhar (Ph. D) "Detection andPreventation of wormhole in Stateless Multicasting" International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
  8. Kamini Singh, Gyan Singh "Review on Wormhole Security and Their Detection Scheme" IJARCSSE Volume 4, Issue 1, January 2014.
  9. MajidMeghdadi, SuatOzdemir and InanGüler ?A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks? ,in IETETECHNICAL REVIEW,VOL 28 , ISSUE 2 ,MAR-APR 2011.
  10. Debdutta Barman Roy, RituparnaChaki, NabenduChaki "A New cluster-Based Wormhole Intrusion Detection Algorithm for MANET"IJNSA, Volume 1 April 2009.
  11. YashpalsinghGohil, SumeghaSakhreliya, and SumitraMenaria , "A Review On:detectionand prevention of wormhole attack in MANET" , International Journal of Scientific and Research Publications, Volume 3, Issue 2, ISSN 2250-3153 , February2013.
  12. http://harrismare. net/2011/07/14/packet-delivery-ratio-packet-lost-end-to-end-delay.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Wormhole Cluster Monitor Node Routing.