CFP last date
20 May 2024
Reseach Article

Algorithm to Detect and Recover Wormhole Attack in MANETs

by Darshana Sorathiya, Haresh Rathod
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 14
Year of Publication: 2015
Authors: Darshana Sorathiya, Haresh Rathod
10.5120/ijca2015905754

Darshana Sorathiya, Haresh Rathod . Algorithm to Detect and Recover Wormhole Attack in MANETs. International Journal of Computer Applications. 124, 14 ( August 2015), 7-11. DOI=10.5120/ijca2015905754

@article{ 10.5120/ijca2015905754,
author = { Darshana Sorathiya, Haresh Rathod },
title = { Algorithm to Detect and Recover Wormhole Attack in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 14 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number14/22171-2015905754/ },
doi = { 10.5120/ijca2015905754 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:23.024858+05:30
%A Darshana Sorathiya
%A Haresh Rathod
%T Algorithm to Detect and Recover Wormhole Attack in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 14
%P 7-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Mobile Ad-Hoc Network (MANET) is a network in which the mobile nodes are randomly connected with each other. Nodes are dynamically in nature. It usually works by broadcasting the information. Its nature is broadcasting so there is a chance to disrupt network by attacker. The number of attack can be done in Mobile Ad Hoc Network. In this paper we have studied about wormhole attack in AODV. We have analyzed different technique to detect and prevent wormhole attack. In our proposed solution detect and overcome the effect of wormhole attack in MANET.

References
  1. Robinpreet Kaur and Mritunjay Kumar Rai , “A Novel Review on Routing Protocols in MANETs” , Undergraduate Academic Research Journal (UARJ), Volume-1, Issue-1, 2012.
  2. PRADIP M. JAWANDHIYA and MANGESH M. GHONGE, “A Survey of Mobile Ad Hoc Network Attacks”, International Journal of Engineering Science and Technology, Vol. 2(9), pp.- 4063-4071, 2010.
  3. M.H. davda, s.r.javid “A review paper on the study of attacks in MANET with its detection and mitigation scheams ” IJARCSMS, april 2014.
  4. C. Siva Ram Murthy and B.S.Manoj, “Ad hoc Wireless Networks” (Chapter 7), 2014.
  5. E.M.Royer and C.E.Perkins, “Adhoc On-Demand Distance Vector Routing”, IEEE, pp. 90-100, February 1999.
  6. Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks”, IEEE 2003.
  7. L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks”. In the Proceedings of network & distributed system Security Symposium,, February 2004.
  8. Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature”, IEEE, 2011.
  9. Lui K.-S., sChiu H.S., “DelPHI: Wormhole Detection mechanism for Adhoc Wireless Networks” Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. 16–18 January 2006.
  10. Sweety goyai, harish rohil, “Securing MANET against Wormhole Attacl using Neighbour Node Analysis” IJCA volume 81,November 2013
  11. Saleh Ali K.Al-Omari1, Putra Sumari2 “An overview of a mobile ad hoc networks for the existing protocols and application”, International journal of graph theory in wireless Adhoc network, March-2012.
  12. Saurabh Gupta, Subrat Kar, S Dharmaraja, “WHOP: Wormhole Attack Detection Protocol using Hound Packet”, IEEE, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Wormhole attack Wormhole detection techniques