CFP last date
20 May 2024
Reseach Article

Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET

by S.b.geetha, Venkanagouda C Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 6
Year of Publication: 2015
Authors: S.b.geetha, Venkanagouda C Patil
10.5120/19317-0850

S.b.geetha, Venkanagouda C Patil . Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET. International Journal of Computer Applications. 110, 6 ( January 2015), 1-11. DOI=10.5120/19317-0850

@article{ 10.5120/19317-0850,
author = { S.b.geetha, Venkanagouda C Patil },
title = { Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 6 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number6/19317-0850/ },
doi = { 10.5120/19317-0850 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:36.298748+05:30
%A S.b.geetha
%A Venkanagouda C Patil
%T Evaluating the Research Trends and Techniques for Addressing Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 6
%P 1-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security issues in mobile adhoc network (MANET) are veiled by various techniques that were introduced in past decade. Owing to decentralized nature of MANET, the security issues cultivates resulting in welcoming various lethal vulnerabilities. Out of all security issues in MANET, wormhole attack is considered one of the most challenging adversarial modules that tremendously affect the communication system in MANET. This paper presents various significant security techniques for mitigating wormhole attack in MANET. The uniqueness of this paper is that it presents a state-of-art study of existing survey papers and potentially emphasized on techniques for detection and prevention of wormhole attack in MANET. Finally, the study also highlights some of the significant findings as well as research gap that stand as prime contribution of the proposed paper.

References
  1. Basagni, S. , Conti, M. , Giordano, S. , Stojmenovic, I. 2013. Mobile Ad Hoc Networking: The Cutting Edge Directions. John Wiley & Sons. Technology & Engineering. pp. 888
  2. Boukerche, A. 2005. Handbook of Algorithms for Wireless Networking and Mobile Computing. CRC Press, Computers. pp. 1040
  3. Priyanshu and Maurya, A. K. 2014. Survey: comparison estimation of various Routing protocols in mobile ad-hoc Network. International Journal of Distributed and Parallel Systems. Vol. 5, No. 1/2/3
  4. Udhayakumar, K. , Prasanna, T. , Venkatesan, Ramkumar, R. 2014. Security "Attacks and Detection Techniques for MANET. Discovery. Vol. 15. No. 42
  5. Saha, H. N. , Bhattacharyya, D. , Banerjee, B. , Mukherjee, S. , Singh, R. , Ghosh, D. 2013. A review on attacks and secure routing protocols in MANET. International Journal of Innovative Research and Review, Vol. 1, pp. 12-36
  6. Mamatha, G. S. , Sharma, S. C. 2010. Network Layer Attacks and Defense Mechanisms in MANETS- A Survey. International Journal of Computer Applications. Vol. 9, No. 9
  7. Zhang, Y. , Zheng, J. , Ma, M. 2008. Handbook of Research on Wireless Security. Idea Group Inc (IGI), Computers, pp. 860
  8. Issac, B. , Israr, N. 2014. Case Studies in Secure Computing: Achievements and Trends. CRC Press, Computers, pp. 500
  9. Maulik, R. , Chaki, N. 2011. A study on wormhole attacks in MANET. International Journal of Computer Information Systems and Industrial Management Applications, pp. 2150-7988
  10. Nigam, N. , Saraf, A. , Nagar, C. 2011. A Review New Thread Based Wormhole Attack Prevention Mechanism in MANET. International Journal of Electrical, Electronics & Computer Engineering, Vol. 1 (1), pp. 84-87
  11. Heidari, A. , Azad, I. 2011. A Survey of Wormhole Attack and Countermeasures against that in Wireless Ad-hoc Networks. 5th Symposium on Advance in Science & Technology
  12. Singh, M and Das, R. 2014. A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network. International Journal of Scientific & Engineering Research
  13. Kumar, S. , Pahal , V. , Garg, S. 2012. Wormhole attack in Mobile Ad Hoc Networks: A Review. IRACST – Engineering Science and Technology: An International Journal, Vol. 2, No. 2
  14. Arora, D. , Goyal, S. 2012. A Survey of Routing Protocols and Wormhole Attack in Mobile Ad Hoc Networks. International Journal of Research in Engineering and Applied Sciences. Vol. 2, Issue. 2
  15. Garg, A. , Sharma, S. 2014. A Study on Wormhole Attack in MANET. International Journal of Scientific Research Engineering & Technology, Vol. 3 Issue. 2
  16. Dabas, P. , Thakral, P. 2013. Detection and Prevention of Wormhole Attack in MANET: A Review. International Journal of Advanced Research in Computer Science and Software Engineering. Vol. 3, Issue. 3
  17. Saluja, B. K. , Gupta, A. K. 2014. A Survey of Different Approaches to Detect Wormhole attack. International Journal of Computer Science and I1nformation Technologies, Vol. 5 (3)
  18. Patel, B. N. , Patel, T. S. 2014. A Survey on Detecting Wormhole Attack in Manet. Journal of Engineering Research and Applications, Vol. 4, Issue. 3, pp. 653-656
  19. Kumari, H. , Vyas, G. , Dhankar, S. 2014. A Survey of Wormhole Detection and Prevention Technique in DSR Protocol. International Journal of Engineering, Management & Sciences, ISSN: 2348 –3733, Vol. 1, Issue. 9
  20. André, G. , Hoene, C. 2005. Measuring round trip times to determine the distance between WLAN nodes. , Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks, Mobile and Wireless Communications Systems, pp. 768-779
  21. Phuong, T. V. , Canh, N. T. , Lee, Y-K. , Lee, S. ,. Lee, H. 2007. Transmission time-based mechanism to detect wormhole attacks. IEEE Asia-Pacific Service Computing Conference, pp. 172-178
  22. Upadhyay, S. , Bajpai, A. 2012. Avoiding Wormhole Attack in MANET using Statistical Analysis Approach. International Journal on Cryptography and Information Security, Vol. 2, No. 1
  23. Y. -C, Hu. , Perrig, A. , Johnson, D. B. 2003. Packet leashes: a defense against wormhole attacks in wireless networks. INFOCOM
  24. Fatehpuria, A. K. , Raghuwanshi, S. 2013. An Efficient Wormhole Prevention in MANET through Digital Signature. International Journal of Emerging Technology and Advanced Engineering, Vol. 3, Issue. 3
  25. Akila, T. , Uma Maheswari, P. , Sivanandam, S. N. 2014. TQDS: Time Stamped Quantum Digital Signature to Defend Wormhole Attack in Wireless Sensor Network. International Journal of Research in Engineering and Technology, Vol. 03, Issue. 07
  26. Dhillon, D. , Randhawa, T. S. , Wang, M. , Lamont, L. 2004. Implementing a fully distributed certificate authority in an OLSR MANET. In Wireless Communications and Networking Conference, Vol. 2, pp. 682-688
  27. Anita. , Mary, EA. , Vasudevan, V. , Ashwini, A. 2010. A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs. IEEE International Conference on Communication Control and Computing Technologies Conference , pp. 407-412
  28. Anusha , K. , Jayaleshwari , N. , Kumar, A. , Rajyalakshmi, G. V. 2013. An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionist Fuzzy, International Journal of Engineering and Technology, Vol 5 No. 3,
  29. Manoj, V. , Aaqib, M. , Raghavendiran , N. , Vijayan, R. 2012. A Novel Security Framework using Trust and Fuzzy Logic in Manet. International Journal of Distributed and Parallel Systems, Vol. 3, No. 1
  30. Revathi, P. , Sahana , M. M. , Dharmar, V. 2013. Cross Layer Detection of Wormhole In MANET Using FIS. ITSI Transactions on Electrical and Electronics Engineering, Vol. 1, Issue. 3
  31. Gopinath, S. , Nirmala, S. , Sureshkuma, N. 2012. Misbehavior Detection: A New Approach for MANET. International Journal of Engineering Research and Applications, Vol. 2, Issue. 1, pp. 993-997
  32. Rajaram, A. , Palaniswami, S. 2009. A Trust-Based Cross-Layer Security Protocol for Mobile Ad hoc Networks. International Journal of Computer Science and Information Security. Vol. 6, No. 1
  33. Soufiene,D. , N-Abdesselam, F. , Khokhar, A. 2009. A cross layer framework to mitigate a joint MAC and routing attack in multihop wireless networks. IEEE Conference on Local Computer Networks, pp. 730-737
  34. Azer, M. , E-Kassas, S. , E-Soudani, M. 2009. Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks. International Journal of Computer Science and Information Security, Vol. 1, No. 1
  35. Vijayalakshmi, S. , Albert Rabara, S. 2011. Weeding Wormhole Attack in MANET Multicast Routing using Two Novel Techniques - LP3 and NAWA. International Journal of Computer Applications, pp. 0975 – 8887, Vol. 16, No. 7
  36. Vani, A. , Rao, S. 2011. A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks. International Journal on Computer Science and Engineering, Vol. 3, No. 6, 2011
  37. Haq, S. U. , Hussain and, F. B. , Hassan, H. M. 2011. Out-of-band Wormhole Attack Detection in MANETs. 3rd International Conference on Machine Learning and Computing, 2011
  38. Singh, J. , Sharma, N. 2012. An Advanced IDS Approach to Detect Wormhole Attack in VANET. International Refereed Journal of Engineering and Science, Vol. 1, Issue. Vol. 3, pp. 09-12
  39. Upadhyay, S. , Bajpai, A. 2012. Avoiding Wormhole Attack in MANET using Statistical Analysis Approach. International Journal on Cryptography and Information Security, Vol. 2, No. 1
  40. Jaiswal, S. , Agrawal, S. 2012. A Novel Paradigm: Detection& Prevention of Wormhole Attack in Mobile Ad Hoc Networks. International Journal of Engineering Trends and Technology. Vol. 3, Issue. 5
  41. Niranjan, P. , Srivastava, P. , Soni, R. K. , Pratap, R. 2012. Detection of Wormhole Attack using Hop-count and Time delay Analysis. International Journal of Scientific and Research Publications, Vol. 2, Issue. 4
  42. Sebastian, M. , Kumar, A. R. 2013. A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer. Computer Network and Information Security, Vol. 8, pp. 28-38
  43. Shahnawaz, H. , Joshi, R. C. , Gupta, S. C. 2013. Design of Detection Engine for Wormhole Attack in Adhoc Network Environment. International Journal of Engineering and Technology, Vol. 4, No 6
  44. Vandana, C. P. , Devaraj A. F. S. 2013. MLDW- a Multilayered Detection mechanism for Wormhole attack in AODV based MANET. International Journal of Security, Privacy and Trust Management, Vol. 2, No 3
  45. Singh, P. , Srivastava, A. , Gupta, N. 2013. A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w towards Lower Battery Power Consumption. Journal of Computer Engineering, Vol. 15, Issue. 1, PP 51-58
  46. Satheeshkumar , B. , Kalaivani, R. 2014. Privacy Protection against Wormhole Attacks in Manet. International Journal of Computer Science and Mobile Applications, Vol. 2 Issue. 1, pp. 56-62
  47. Otmani, M. , Ezzati, A. 2014. Effects of Wormhole Attack On AODV and DSR Routing Protocol Through The Using NS2 Simulator. Journal of Computer Engineering, Vol. 16, Issue. 2, pp. 1 01-107
  48. Rafsanjani, M. K. ,. Samani, M. E. 2013. Resist SRP against Wormhole Attack. Romanian Journal of Mathematics and Computer Science. Vol. 3, Issue. 1, pp. 60-70, 2013
  49. Khalil, I. , Bagchi, S. , Shroff, N. B. 2007. LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. Computer networks, Vol. 51, No. 13, pp. 3750-3772
  50. Tran, P. V. , Lee, Y-K. , Hung, L. X. , Lee, S. , Lee, H. 2007. TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In Consumer Communications and Networking Conference, pp. 593-598
  51. Poovendran , R. , Lazos, L. 2007. A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, Vol. 13, No. 1, pp. 27-59
  52. Vu, H. , Kulkarni, A. , Sarac, K. , Mittal, N. 2008. WORMEROS: A New Framework for Defending against Wormhole Attacks onWireless Ad Hoc Networks. Springer-Verlag Berlin Heidelberg
  53. Khalil, I. , Bagchi, S. , Shroff, N. B. 2008. MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks", Ad Hoc Networks, Vol. 6, No. 3, pp. 344-362
  54. Khurana, S. , Gupta, N. 2008. FEEPVR: First End-to-End protocol to Secure Ad hoc Networks with variable ranges against Wormhole Attacks. In Emerging Security Information, Systems and Technologies, Second International Conference, pp. 74-79
  55. Jen, S-M. , Laih, C-S. , Kuo, W-C. 2009. A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, Vol. 9, No. 6, pp. 5022-5039
  56. Li, Z. , Pu, D. , Wang, W. , Wyglinski, A. 2011. Forced collision: detecting wormhole attacks with physical layer network coding. Tsinghua Science & Technology, Vol. 16, No. 5,pp. 505-519
  57. Gupta, S. , Kar, S. , Dharmaraja, S. 2011. WHOP: Wormhole attack detection protocol using hound packet. International Conference In Innovations in Information Technology , pp. 226-231
  58. Stoleru, R. , Wu, H. , Chenji, H. 2012. Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Networks, Vol. 10, No. 7, pp. 1179-1190
  59. Matam, R. , Tripathy, S. 2013. WRSR: wormhole-resistant secure routing for wireless mesh networks, Journal on Wireless Communications and Networking, Vol. 180
  60. Kim, D-K. , Kim, H-W. , Kim and, G. , Kim, S. 2013. Research Article a Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods. International Journal of Distributed Sensor Networks, pp. 6
  61. Shi, Z. , Sun, R. , Lu R. , Qiao, J. , Chen, J. , Shen, X. U. E. M. I. N. 2013. A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network. Emerging Topics in Computing
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Adhoc Network Security Wormhole Attack Wormhole Tunnel.