CFP last date
20 January 2025
Reseach Article

Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network

Published on July 2016 by Siddhesh Khanvilkar, Sandeep B. Raskar
International Conference on Internet of Things, Next Generation Networks and Cloud Computing
Foundation of Computer Science USA
ICINC2016 - Number 3
July 2016
Authors: Siddhesh Khanvilkar, Sandeep B. Raskar
35d6636c-4ba9-4098-97d5-13d4077ce1c2

Siddhesh Khanvilkar, Sandeep B. Raskar . Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network. International Conference on Internet of Things, Next Generation Networks and Cloud Computing. ICINC2016, 3 (July 2016), 13-18.

@article{
author = { Siddhesh Khanvilkar, Sandeep B. Raskar },
title = { Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network },
journal = { International Conference on Internet of Things, Next Generation Networks and Cloud Computing },
issue_date = { July 2016 },
volume = { ICINC2016 },
number = { 3 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 13-18 },
numpages = 6,
url = { /proceedings/icinc2016/number3/25536-4828/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%A Siddhesh Khanvilkar
%A Sandeep B. Raskar
%T Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network
%J International Conference on Internet of Things, Next Generation Networks and Cloud Computing
%@ 0975-8887
%V ICINC2016
%N 3
%P 13-18
%D 2016
%I International Journal of Computer Applications
Abstract

In wormhole attack, an attacker node keeps data packets at one location in the network and forward to another attacker node far away by tunneling, which again broadcast them into the network locally. The proposed technique is an efficient detection and prevention method called Wormhole Attack Prevention and Detection Using Authentication Based Delay per Hop Technique for Wireless Network. Detection of wormhole attack is done using number of hops and delay of each node in different paths available in network. The sender node is capable to identify both types of wormhole attacks. Proposed technique detects the legitimate path and path under the wormhole attack. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator.

References
  1. S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing protocol Performance issues and Evaluation Considerations January 1999," RFC2501.
  2. SaurabhUpadhaya and ArunaBajpai, Avoiding Wormhole Attack in MANET using Statistical Approach, IEEE March 2012
  3. Y Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," MobiCom'2000, Boston, Massachusetts, Aug. 6-11, 2000, PP. 275 - 283
  4. Ming-Yang Su. Warp: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computer Security, Vol. 29, March 2010
  5. RushaNandy and Debdutta Berman Roy, Study if Various Attack in MANET and Elaborative Discussion of Rushing Attack on DSR with clustering scheme, IEEE 13 March 2011
  6. ReshmiMaulik and NabenduChaki, A Study of Wormhole Attacks in MANET. International journal of computer information systems and industrial management application 2011 PP. 271-279.
  7. Khalil S. Bagchi and N. B. Shro_. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. International Conference on Dependable Systems and Networks, PP 612-621,2005.
  8. W. Weichao, B. Bharat, Y. Lu, X. Wu, Wiley Interscience, ?Defending agains Wormhole Attacks in Mobile Ad Hoc Networks,? Wireless Communication and Mobile Computing, January 2006.
  9. X. Wang and J. Wong. An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference, PP 39-48, 2007.
  10. S. Gupta, S. Kar and S. Dharmaraja, "WHOP: wormhole Attack Detection protocol using hound packet". In the international conference on innovations Technology, IEEE 2011.
  11. Y Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless networks," Proc. Of INFOCOM',April 2003, PP. 1976- 1986.
  12. H. S. Chiu and K. S. Lui. DELPHI: wormhole detection mechanism for ad hoc wireless networks. 1st International Symposium on Wireless Pervasive Computing, PP 6-11, January 2006
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Ad-hoc Network Wormhole Attack Tunnel Wormhole Detection Technique Wormhole Affected Path Avoidance.