CFP last date
20 May 2024
Reseach Article

An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET

by Kapil Raghuwanshi, Amit Saxena, Manish Manoria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 110 - Number 7
Year of Publication: 2015
Authors: Kapil Raghuwanshi, Amit Saxena, Manish Manoria
10.5120/19329-0849

Kapil Raghuwanshi, Amit Saxena, Manish Manoria . An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET. International Journal of Computer Applications. 110, 7 ( January 2015), 16-21. DOI=10.5120/19329-0849

@article{ 10.5120/19329-0849,
author = { Kapil Raghuwanshi, Amit Saxena, Manish Manoria },
title = { An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { January 2015 },
volume = { 110 },
number = { 7 },
month = { January },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume110/number7/19329-0849/ },
doi = { 10.5120/19329-0849 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:45:44.674332+05:30
%A Kapil Raghuwanshi
%A Amit Saxena
%A Manish Manoria
%T An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 110
%N 7
%P 16-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

'Mobile ad hoc network (MANET)' is an infrastructure less, self controlled wireless network it doesn't need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and 'wormhole attack' is also present in those attacks. It is the most powerful attack and very difficult to detect in 'wormhole attack' two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of 'wormhole attack' is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.

References
  1. Kush, Ashwani "Security and Reputation Schemes in Ad-Hoc Networks Routing", International Journal of Information Technology and Knowledge Management, Volume 2, No. 1, pp. 185-189 June 2009.
  2. Kush, "A Security Aspects in AD hoc Routing", Computer Society of India Communications, Vol. no 32 Issue 11, pp. 29-33 March 2009.
  3. K. Toh, "Ad Hoc Wireless Networks".
  4. S. K. Sarkar, T. G. Basavaraju and C. Puttamadappa, "Ad Hoc Mobile Wireless Networks".
  5. Z. Danailov, "Attacks on Mobile Ad hoc Netwoks", Seminar Report, Integrated Information Systems, Ruhr University, Bochum, Germany, 2012.
  6. Y. C. Hu, A. Perrig and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols", in Proceedings of the ACM Workshop on Wireless Security, pp 30–40, 2003.
  7. D. B. Roy, R. Chaki and N. Chaki, "A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks" International Journal of Network Security & Its Applications (IJNSA), Vol. 1, No. 1, 2009.
  8. Y. C. Hu, A. Perrig and D. B. Johnson, "Wormhole Detection in Wireless Ad Hoc Networks", Technical Report TR01-384, Rice University Department of Computer Science, 2002.
  9. Y. C. Hu, A. Perrig and D. B. Johnson, "Wormhole attacks in wireless networks", IEEE journal on selected areas in communications, Vol. 24, No. 2, 2006.
  10. L. Qian, N. Song and X. Li, "Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path"
  11. Xu Su Rajendra V. Boppana, "On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks", in proceedings of IEEE Communications Society, ICC 2007.
  12. A. VANI and D. S. Rao, "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing in Ad Hoc Wireless Networks", International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 3, No. 6, 2011.
  13. R. Maheshwari, J. Gao and S. R Das, "Detecting Wormhole Attacks in Wireless Networks using Connectivity Information",
  14. L. Hu and D. Evans "Using Directional Antennas to Prevent Wormhole Attacks" In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
  15. V. Kumar and A. Kush, "Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol", International Journal of Computer Applications, Vol. 44, No. 4, 2012.
  16. K. Win, "Analysis of Detecting Wormhole Attack in Wireless Networks", World Academy of Science, Engineering and Technology 24, 2008.
  17. Y. Xu, G. Chen, J. Ford and F. Makedon, "Detecting Wormhole Attacks in Wireless Sensor Networks",
  18. W. Ahad and M. Sharma, "Efficient Multipath Algorithm in MANETs to Prevent Wormhole Attack", CT International Journal of Information & Communication Technology, Vol. 1, Issue 1, pp 5-8, 2013.
  19. P. V. Tran, L. X. Hung, Y. K. Lee, S. Lee and H. Lee, "TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks", IEEE, pp 593-598, 2007.
  20. T. V. Phuong, N. T. Canh, Y. K. Lee, S. Lee, and H. Lee, "Transmission Time-based Mechanism to Detect Wormhole Attacks", IEEE Asia-Pacific Services Computing Conference, IEEE Computer Society, pp 172-178, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

AODV MANET Malicious node Packet drop ratio Wormhole Attack.