CFP last date
20 May 2024
Reseach Article

A brief Analysis on Detection and Avoidance Techniques of Wormhole Attack in MANET

by Dhruva Patel, Parth Trivedi, M.b.potdar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 16
Year of Publication: 2015
Authors: Dhruva Patel, Parth Trivedi, M.b.potdar
10.5120/20638-3317

Dhruva Patel, Parth Trivedi, M.b.potdar . A brief Analysis on Detection and Avoidance Techniques of Wormhole Attack in MANET. International Journal of Computer Applications. 117, 16 ( May 2015), 14-17. DOI=10.5120/20638-3317

@article{ 10.5120/20638-3317,
author = { Dhruva Patel, Parth Trivedi, M.b.potdar },
title = { A brief Analysis on Detection and Avoidance Techniques of Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 16 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number16/20638-3317/ },
doi = { 10.5120/20638-3317 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:32.801712+05:30
%A Dhruva Patel
%A Parth Trivedi
%A M.b.potdar
%T A brief Analysis on Detection and Avoidance Techniques of Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 16
%P 14-17
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANETs) is a temporary wireless network, which is self-configuring in which nodes moves freely and continuously. It consists of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. Due to its mobility and self-routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layer. Wormhole attack is a network layer attack observed in MANET, which completely disrupts the communication channel. Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbours and makes conversation through the wormhole tunnel. The goal of this paper to study wormhole attack, some detection methods and different techniques to prevent network from these attacks.

References
  1. Assiut, Egypt, Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William: "A Lightweight Technique to Prevent Wormhole Attacks in AODV" International Journal of Computer Applications ,Volume 104 – No. 6, October 2014
  2. Aarti: "Study of MANET: Characteristics, Challenges, Application and Securiy Attacks" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013. R. Nicole, "The Last Word on Decision Theory," J. Computer Vision, submitted for publication. (Pending publication)
  3. P. Chandra Sekhar: "A SURVEY ON MANET SECURITY CHALLENGES AND ROUTING PROTOCOLS" Int. J. Computer Technology & Applications(IJCTA), Vol 4, Mar-Apr 2013.
  4. Shivangi Dwivedi, Priyanka Tripathi: "An Efficient Approach for Detection of Wormhole Attack in Mobile Ad-hoc Network" International Journal of Computer Applications, Volume 104 – No. 7, October 2014
  5. Farman Ahmed, Ankit Jha ,Neeraj Kumar: "Efficient Approach for the Detection of Wormhole Attack Using Dynamic Source Routing Protocol in MANET" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 8, August 2014
  6. Ajit Singh, Lehra Gaga, O. S. Khanna: "Multipath Algorithm For Prevention Of Wormhole Attack In Manet", Journal of Advanced Studies and Communication Research, Volume. 1, Issue. 3, March 2014
  7. Prof. Ramya S Pure, Prof. Gouri Patil, Prof. Mohammad Manzoor Hussain: "Trust based solutions using counter strategies for Routing attacks in MANET" International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue4,June2014.
  8. Yih-Chun Hu, Adrian Perig, David B. Johnson: "Wormhole Attack on Wireless Network" IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, Vol. 24-No 2,2006.
  9. K. Sivakumar, Dr. G. Selvaraj: "Analysis of Worm Hole Attack In MANET And Avoidance Using Robust Secure Routing Method" International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 1, January 2013.
Index Terms

Computer Science
Information Sciences

Keywords

MANET wormhole attack