CFP last date
20 May 2024
Reseach Article

WIDPS: Wormhole Attack Intrusion Detection and Prevention Security Scheme in MANET

by Priyankaverma, Sumit Dhariwal, Harshvardhan Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 10
Year of Publication: 2014
Authors: Priyankaverma, Sumit Dhariwal, Harshvardhan Tiwari
10.5120/18414-9709

Priyankaverma, Sumit Dhariwal, Harshvardhan Tiwari . WIDPS: Wormhole Attack Intrusion Detection and Prevention Security Scheme in MANET. International Journal of Computer Applications. 105, 10 ( November 2014), 21-26. DOI=10.5120/18414-9709

@article{ 10.5120/18414-9709,
author = { Priyankaverma, Sumit Dhariwal, Harshvardhan Tiwari },
title = { WIDPS: Wormhole Attack Intrusion Detection and Prevention Security Scheme in MANET },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 10 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 21-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number10/18414-9709/ },
doi = { 10.5120/18414-9709 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:22.592242+05:30
%A Priyankaverma
%A Sumit Dhariwal
%A Harshvardhan Tiwari
%T WIDPS: Wormhole Attack Intrusion Detection and Prevention Security Scheme in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 10
%P 21-26
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad hoc network (MANET) is a collection of mobile nodes that form a temporary dynamic network without any fixed infrastructure and centralized administration. In this type of network it is difficult to have the reliable & secure communication in MANET. In this paper we proposed a scheme against wormhole attack in MANET. In this research we proposed Wormhole attack Intrusion Detection as well as prevention Security Scheme (WIDPS) against wormhole attack using the IDP nodes. Using the proposed algorithm for detecting the wormhole node, IDP node will analyze the behavior each nodes based on packets send by the nodes, will detect the node with abnormal behavior. After that we prevent wormhole attack using broadcasting the particular identification (ID) of attacker so that no node in network replies to that request and secure the mobile ad-hoc network communication. Through our proposed work we provide reliable as well as secure communication in network from wormhole attack and measure the network performance on the basis of network parameter like routing load, throughput and packet delivery ratio.

References
  1. Ravinder Ahuja , Alisha Banga Ahuja and Pawan Ahuja,"Performance Evaluation and Comparison of AODV and DSR Routing Protocols in MANETs Under Wormhole Attack", Proceedings of the 2013 IEEE Second International Conference on Image Information Processing (ICIIP), pp. 699-702, 2013.
  2. MehranAbolhasan , TadeuszWysocki , ErykDutkiewicz "A review of routing protocols for mobile ad hoc networks" Elsevier, Ad Hoc Networks 2, pp. 1–22, 2004.
  3. Haas, Zygmunt J. , Pearlman, Marc R. : The Performance of Query Control Schemes for the Zone Routing Protocol, IEEE/ACM Transactions on Networking, Vol. 9, No. 4, August 2001,
  4. Umeshkumarchaurasia and Varshasingh, "MAODV: Modified Wormhole Detection AODV Protocol", IEEE Sixth International Conference on Contemporary Computing (IC3), pp. 239 - 243, 8-10 August 2013
  5. Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature", 3rd IEEE International Conference on Communication Software and Networks (ICCSN), pp. 307 – 311, 2011.
  6. Dr. N. Sreenath, A. Amuthan, & P. Selvigirija "Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs", International Conference on Computer Communication and Informatics (ICCCI -2012), pp. 1-7, 2012.
  7. K. S. Sujatha, VydekiDharmar, R. S. Bhuvaneswaran "Design of Genetic Algorithm based IDS for MANET", International Conference on Recent Trends in Information Technology (ICRTIT), pp. 28-33, 2012.
  8. Dr Karim Konate, Gaye Abdourahime "Attacks Analysis in mobile ad hoc networks: Modeling and Simulation", 2011 Second International Conference on Intelligent Systems, Modelling and Simulation, pp. 367 – 372, 2011.
  9. N. Gandhewar, R. Patel, "Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network", Fourth International Conference on Computational Intelligence and Communication Networks (CICN), pp. 714 – 718, 2012.
  10. S. Gupta, S. Kar and S. Dharmaraja, "WHOP: wormhole Attack Detection protocol using hound packet". In the international conferenceon innovations Technology, IEEE 2011.
  11. HumairaEhsan, FarrukhAslam Khan "Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs" IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 1181-1187, 2012.
  12. http://www. isi. edu/nsnam/ns/.
Index Terms

Computer Science
Information Sciences

Keywords

MANET WIDPS routing security performance metrics wormhole attack