Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

Examination of AODV Routing Protocol with Wormhole Attack

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Gulzar Ahmad Wani, Sanjay Jamwal

Gulzar Ahmad Wani and Sanjay Jamwal. Article: Examination of AODV Routing Protocol with Wormhole Attack. International Journal of Computer Applications 135(5):31-35, February 2016. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Gulzar Ahmad Wani and Sanjay Jamwal},
	title = {Article: Examination of AODV Routing Protocol with Wormhole Attack},
	journal = {International Journal of Computer Applications},
	year = {2016},
	volume = {135},
	number = {5},
	pages = {31-35},
	month = {February},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


In Adhoc Network, Mobile Adhoc Network (MANET) is vibrant Adhoc network. MANET is collection of mobile network devices that are connected through wireless medium i.e., radio signals. These mobile network devices form a dynamic topology i.e., mobile nodes move freely and quickly, in and out from network. These is no central control for co-coordinating these network device i.e. decentralized network .These devices control each other directly i.e, peer-to-peer connection. The dynamic nature of MANET makes it vulnerable to variety of security threats like wormhole attack, eavesdropping etc. The performance and reliability of the network is affected by making alteration in routing protocols by the attacker. Wormhole attack is a type of tunneling attack where an attacker at one end of tunnel attracts data packets from one hop neighbors and transmits these data packets to another attacker of the tunnel which delivers these data packets to destination node. Transmitting data packets through tunnel may result various security attacks like wormhole attack, black hole attack, eavesdropping attack. This proposed paper examines the consequences of wormhole attack in AODV routing protocol based MANET using OPNET Simulator.


  1. L.Sudha Rani, R.Raja Sekhar, “ Detection and prevention of wormhole attack in stateless multicasting ”, International journal of Science & Engineering Research Volume 3, issue 3, March – 2012. Page 1-5.
  2. Jian Yin, Sanjay Madria, “A hierarchical secure routing protocol against black hole attack in sensor network”, IEEE SUTC, 2006.
  3. S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Ann. ACM Int'l Conf. Mobile Computing and Networking, ACM Press, 2000, pp. 255– 265.
  4. S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol ", in Proc. 3rd ACM Intl. Symp., on Mobile Ad Hoc Networking and Computing, Jun 2002.
  5. P.G. Argyroudis and D. O’Mahony, “Secure Routing for mobile ad hoc networks”, IEEE Communications Surveys & Tutorials, third quarter 2005, Vol. 7, no3, 2005 258 Authorized licensed use limited to: University of Allahabad. Downloaded on July 30, 2010 at 16:19:57 UTC from IEEE Xplore. Restrictions apply.
  6. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Tohoku University and Abbas Jamalipour, University of Sydney, “A Survey of Routing Attacks in Mobile Ad Hc Networks”, Security in Wireless Mobile Ad Hoc Networks and Wireless Sensors, IEEE Wireless Communications, October 2007.
  7. C. Perkins and P. Bhagwat. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM '94 Conference on Communications, Architectures, Protocols, and Applications, (London, UK, Sept. 1994), p. 234-244.
  8. C. Adjih, A. Laouiti, P. Minet, et. al., Optimized link state routing protocol. Work in Progress, IETF draft, MANET Working Group, INRIA Rocquencourt, France, 2003.
  9. D. Johnson and D. Maltz,”Dynamic source routing in ad hoc wireless networks”, In Mobile computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 1996: Ch. 5, p. 153-181.
  10. C. Perkins and E. Royer. Ad-hoc on-demand distance vector routing. In Workshop on Mobile Computing and Systems Applications, 1999.
  11. Park and M. Corson, Temporally-ordered routing algorithm (TORA) version: 1 functional specification. Internet-Draft, draft-ietfmanet-tora-spec-00. Txt, November 1997.
  12. Haas and M. Pearlman, The zone routing protocol (ZRP) for ad hoc networks. Internet draft, Mobile Ad-Hoc Network (MANET) Working Group, IETF, 1998.
  13. P. Khengar and A. Aghvami, Warp-the wireless adaptive routing protocol. In Proceedings of IST Mobile Communications Summit 2001, 2001, p. 480–485.
  14. Preeti Bhati, Rinki Chauhan, and R.K. Rathy, “An Efficient Agent Based Routing Protocol in MANET”, International Journal of Computer and Engineering, Vol No. 7, July 2011.
  15. Charles E. Perkins and Elizabeth M. Royer,” Ad-hoc On-Demand Distance Vector Routing”, 2nd IEEE WorkShop on Mobile Computing System and Application (WMCSA’99).
  16. Laxmi Shrivasta, Sarita S. Bhadauria, G.S. Tomar, “Performance Evaluation of Routing Protocols in MANET with Different Traffic Loads”, International Conference on Communication System and Network Techonologies IEEE 2011.


MANET, Wormhole Attack, AODV Protocol, Route Request (RREQ),Route Reply(RREP),Broad-cast.