CFP last date
20 June 2024
Reseach Article

WDAP: Wormhole Detection and Avoidance Protocol for Mobile Ad-hoc Environment

by Nitika Chaure, Khushboo Sawant
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 6
Year of Publication: 2016
Authors: Nitika Chaure, Khushboo Sawant

Nitika Chaure, Khushboo Sawant . WDAP: Wormhole Detection and Avoidance Protocol for Mobile Ad-hoc Environment. International Journal of Computer Applications. 156, 6 ( Dec 2016), 6-11. DOI=10.5120/ijca2016912465

@article{ 10.5120/ijca2016912465,
author = { Nitika Chaure, Khushboo Sawant },
title = { WDAP: Wormhole Detection and Avoidance Protocol for Mobile Ad-hoc Environment },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 6 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016912465 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:01:51.361231+05:30
%A Nitika Chaure
%A Khushboo Sawant
%T WDAP: Wormhole Detection and Avoidance Protocol for Mobile Ad-hoc Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 6
%P 6-11
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Network security is an important criteria for wired and wireless communication. The advancement in wireless technologies and the high availability of wireless equipment in everyday devices is a factor in the success of infrastructure-less networks. MANETs are becoming more and more common due to their ease of deployment. The high availability of such networks and the lack in security measures of their routing protocols are alluring a number of attackers to intrude. In such environment, the presence of malevolent nodes may result in wormhole attacks. In this paper, a secured AODV-based routing scheme Wormhole Detection and Avoidance i.e. WDAP is proposed for mitigating such attacks. Implementation is performed in NS2 environment and results are provided to demonstrate the effectiveness of our approach, using the packet delivery ratio, Network throughput, Routing Overhead and the number of packets received by destination, as performance indicators.

  1. Indrani Das and D. K Lobiyal, “Effect of Mobility Models on the Performance of Multipath Routing Protocol in MANET”, Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP), PP. 149–155, 2014
  2. AsisNasipuri Chapter 3 Mobile Ad Hoc Networks Handbook of RF and Wireless Technologies, Newnes is an imprint of Elsevier. 200 Wheeler Road, Burlington, MA 01803, USA, 2004
  3. T DivyaSaiKeerthi and PallapaVenkataram, “Locating the Attacker of Wormhole Attack by Using the Honeypot”, IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, PP. 1175 – 1180, 2012
  4. Hu, Y. Perrig, A., and Johnson D., Packet Leashes: “A Defense Against Wormhole Attacks in Wireless Network”, In Proceedings of the 22nd IEEE International Conference Computer and Communications, Volume 3, pp.1976–1986, April 2003.
  5. SrdjanCapkun, LeventeButtyan and Jean-Pierre Hubaux, 2003 “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks” SASN’03 Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32.
  6. L. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks," In Network and Distributed System Security Symposium (NDSS), San Diego California,USA, 5-6 February, 2004.
  7. Chiu, HS; Wong Lui, KS, 2006 “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks” 1st International Symposium on Wireless Pervasive Computing
  8. YurongXu, Guanling Chen, James Ford and FilliaMakedon, 2007 “Detecting wormhole attacks in wireless sensor networks” International Federation for Information Processing proceedings on critical infrastructure protection, volume 253, pp. 267-279
  9. Issa Khalil, SaurabhBagchi, and Ness B. Shroff, 2008 “MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multi-hop Wireless Networks” Ad Hoc Networks, Volume 6, Issue 3, pp. 344-362
  10. N. Song, L. Quin, and X. Li., “Wormhole Attack Detection in Wireless Ad hoc Networks: A Statistical Analysis Approach”, In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.
  11. DharaBuch, DeveshJinwala, “Detection of Wormhole Attacks in Wireless Sensor Networks”, IEEE Conference on Advances in Recent Technologies in Communication and Computing, pp 7-14, 2011.
  12. Majid Meghdadi, SuatOzdemir and InanGuler, “A Survey of Wormhole based Attacks and their Countermeasures in Wireless Sensor Networks”, IETE Technical Review, VOL 28, ISSUE 2, Mar-Apr 2011.
  13. Mani Arora, Rama Krishna Challa,” Performance Evaluation of Routing Protocols Based on Wormhole Attack in Wireless Mesh Networks”, Second International Conference on Computer and Network Technology, pp 102-104, 2010.
  14. The Network Simulator. NS-2 [Online]
Index Terms

Computer Science
Information Sciences


MANET RREQ RREP AODV Wormhole NS–2 Security Wireless Communication