CFP last date
20 May 2024
Reseach Article

Survey on Wormhole Attack Detection Techniques in Mobile Ad-hoc Network

by Dipika Baid, Kriti Dugar, Pratima Sarkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 11
Year of Publication: 2015
Authors: Dipika Baid, Kriti Dugar, Pratima Sarkar
10.5120/21270-4015

Dipika Baid, Kriti Dugar, Pratima Sarkar . Survey on Wormhole Attack Detection Techniques in Mobile Ad-hoc Network. International Journal of Computer Applications. 120, 11 ( June 2015), 9-12. DOI=10.5120/21270-4015

@article{ 10.5120/21270-4015,
author = { Dipika Baid, Kriti Dugar, Pratima Sarkar },
title = { Survey on Wormhole Attack Detection Techniques in Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 11 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number11/21270-4015/ },
doi = { 10.5120/21270-4015 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:05:55.955099+05:30
%A Dipika Baid
%A Kriti Dugar
%A Pratima Sarkar
%T Survey on Wormhole Attack Detection Techniques in Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 11
%P 9-12
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad-hoc Network (MANET) exposes itself to wide range of security attacks due to its broadcast nature and lack of central authority, wormhole attack is one of devastating attack that can easily be launched by attacker without the knowledge of the network of compromising any legitimate nodes or cryptographic mechanisms. Here a malicious node can drop, delay, tunneling or replay the packets depending nature of the attack. As malicious nodes in wormhole attack hide their original identity and they do not compromise any node so detection of this attack is difficult. In this paper several detection techniques of wormhole attack in a MANET are discussed that uses on demand AODV or DSR routing protocol. The result shows comparison between different wormhole attack detection techniques.

References
  1. Chiu, HS: Wong Lui, KS, 2006 "DELPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Network" 1st International Symposium on Wireless Pervasive Computing.
  2. C. Siva Ram Murthy, B. S. Manoj, 2004 "Ad Hoc Wireless Networks", Pearson Education, Inc.
  3. Urmeet Kaur and Amanpreet Kaur "Performance Analysis of AODV for WormholeAttack Using Different Mobility Models", International Conference on Communication, Computing & Systems (ICCCS–2014), pp, 67-72.
  4. ImrichChlamtac, Macro Conti and Jennifer J. N. Liu, 2003 "Mobile Ad Hoc Networking: Imperatives and Challenges" Ad Hoc Networks, Volume 1, Issue 1 , pp, 13-64.
  5. Issakhalil, Saurabh Bagchi, and Ness B. Shroff, 2008 "MOBIWORP: Mitigation of the Wormhole Attack Multihop Wireless Network" Ad hoc Networks, Volume 6, Issue 3, pp, 344-362.
  6. Issakhalil, Saurabh Bagchi, and Ness B. Shroff, 2005 "LITEWORP: A Liteweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks" IEEE International Conference on Dependable Systems and Networks, pp, 612-621.
  7. Moutushi Singh, Rupayan Das, 2012 "A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network" International Journal of Scientific & Engineering Research Volume 3, ISSN 2229-5518.
  8. Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, 2003 "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks" SASN'03 Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp, 21-32.
  9. T. Sakthivel, R. M. Chandrasekaran, 2012 "Detection and Prevention of Wormhole Attack in MANETs using Path Tracing Approach", European Journal of Scientific Research, Volume 76, pp, 240-252.
  10. Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 "Packet Leashes: A Defense against Wormhole Attack in Wireless Network", Twenty-Second Annual Joint Conference of IEEE Computer and Communications, Volume 3, pp, 1976-1986.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Network (MANET) Wormhole attack Malicious node.