CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network

by Shivangi Dwivedi, Priyanka Tripathi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 7
Year of Publication: 2014
Authors: Shivangi Dwivedi, Priyanka Tripathi
10.5120/18214-9172

Shivangi Dwivedi, Priyanka Tripathi . An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network. International Journal of Computer Applications. 104, 7 ( October 2014), 18-23. DOI=10.5120/18214-9172

@article{ 10.5120/18214-9172,
author = { Shivangi Dwivedi, Priyanka Tripathi },
title = { An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 7 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number7/18214-9172/ },
doi = { 10.5120/18214-9172 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:31.955425+05:30
%A Shivangi Dwivedi
%A Priyanka Tripathi
%T An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 7
%P 18-23
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree of mobility. In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. In such networks, the wireless mobile nodes may dynamically enter the network as well as go-ahead the network. Mobile ad hoc network is a group of many more devices or nodes with the capability of communication and networking. MANET encounter by number of security threat because of its open entrusted environment with little security settlement, even if security over MANET is not to be enhance up to satisfactory level because of its characteristics Security is an essential service for wired and wireless network communication. Due to its mobility and self routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layers, Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbors and makes conversation through the wormhole tunnel. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. For wormhole attack to have a best impact on the wired or wireless network, it must fascinate a huge amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem of wormhole attack.

References
  1. Maulik, R. ; Chaki, N. , "A comprehensive review on wormhole attacks in MANET" IEEE 2010, Page 233-238.
  2. Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE, 2011
  3. Perkins C. and Bhagwat P. : Highly dynamic destination-sequence distance vector routing (DSDV) for mobile computers, In Proceedings of ACM Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM 94), London, UK, pp. 234-244 (1994)
  4. Upadhyay S. and Chaurasia B. K. : Detecting and Avoiding Wormhole Attack in MANET using Statistical Analysis Approach, In the Second International Conference on Computer Science and Information Technology (CCSIT- 2012), Springer, pp. (2012).
  5. Devinder Pal Singh et al. ,' INVESTIGATING THE EFFECT OF WORMHOLE ATTACK ON AODV in 2012.
  6. Azer, M. A. , El-Kassas S. M. , Hassan, A. W. F. , El-Soudani M. S. , "Intrusion Detection for Wormhole Attacks in Ad hoc Networks a Survey and a proposed Decentralized Scheme Marianne " IEEE Third International conference on Availability, Reliability and Security, 2008.
  7. K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks," The International Journal of Computer and Telecommunications Networking vol. 51, pp. 3750-3772, 2007.
  8. S. Choi, D. Kim, D. Lee, J. Jung, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks", Int'l conf. on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343- 348, 2008.
  9. Mahajan, V. Natu, M. Sethi, A, "Analysis of wormhole intrusion attacks in MANETS", IEEE Military Communications Conference, (MILCOM), pp. 1-7, 2008.
  10. S. Marti et al. "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of Sixth Annual IEEE/ACM Intl. Conference on Mobile Computing and Networking , April 2009,PP. 225-256
  11. Jie Zhou1, Jiannong Cao, Jun Zhang1, Chisheng Zhang and Yao Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Test bed" in 26th IEEE International Conference on Advanced Information Networking and Applications,2012
  12. Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE , 2011
  13. Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE, 2012
  14. X. Wang & J. Wong, (2007) "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks", 31st Annual International Computer Software and Applications Conference - Vol. 1 - (COMPSAC 2007), pp. 39-48.
  15. H. S. Chiu & K. S. Lui, (2006) "Delphi: Wormhole Detection Mechanism for Ad Hoc Wireless Networks", Proc. of International Symposium on Wireless Pervasive Computing, pp-6-pp.
  16. Lazes, L. ; Poovendran, R. ; Meadows, C. ; Syverson, P. ; Chang, L. W. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In IEEE WCNC 2005, Seattle, WA, USA, 2005; pp. 1193–1199.
  17. Lazes, L. ; Poovendran, R. ; Meadows, C. ; Syverson, P. ; Chang, L. W. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In IEEE WCNC 2005, Seattle, WA, USA, 2005; pp. 1193–1199.
  18. Hu, Y. C. ; Perrig, A. ; Johnson, D. B. Wormhole Attacks in Wireless Networks. IEEE J. Sel. Area Comm. 2006, 24, 370–38
Index Terms

Computer Science
Information Sciences

Keywords

MANET Wormhole attack Wormhole detection technique Wormhole Avoidance Routing protocols Wormhole attack modes.