CFP last date
22 April 2024
Reseach Article

Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol

by J. Amutha, Rumaisa Azhar, Sandeep Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 21
Year of Publication: 2018
Authors: J. Amutha, Rumaisa Azhar, Sandeep Sharma
10.5120/ijca2018917975

J. Amutha, Rumaisa Azhar, Sandeep Sharma . Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol. International Journal of Computer Applications. 182, 21 ( Oct 2018), 31-36. DOI=10.5120/ijca2018917975

@article{ 10.5120/ijca2018917975,
author = { J. Amutha, Rumaisa Azhar, Sandeep Sharma },
title = { Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 182 },
number = { 21 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number21/30058-2018917975/ },
doi = { 10.5120/ijca2018917975 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:12:02.846943+05:30
%A J. Amutha
%A Rumaisa Azhar
%A Sandeep Sharma
%T Simulation of Wormhole Attack in Wireless Sensor Networks using AOMDV Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 21
%P 31-36
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wormhole attack, a resource depletion attack being considered as one of the severe attack in Wireless Sensor Networks (WSN). It can interfere routing process at any time, drain the battery power of sensor nodes and also can disable the whole system. Hence, this work deals with a technique to identify and prevent wormhole attack using Adhoc On-demand Multipath Distance Vector (AOMDV) protocol. The main purpose of using AOMDV protocol is route discovery, multipath routing, network load handling, increases reliability and avoid the risks of congestion. The proposed technique is implemented in NS2.35 simulator and various performance parameters are evaluated.

References
  1. Govindasamy, J. and Punniakodi, S. 2018. Optimised watchdog system for detection of DDOS and wormhole attacks in IEEE802.15.4-based wireless sensor network. International Journal of Mobile Network Design and Innovation 8(1), 36 - 44.
  2. Orallo, E.H., Olmos, M.D.S., Cano, J.C., Calafate, C.T. and Manzoni, P. 2015. CoCoWa: A Collective Contact-Based Watchdog for Detecting Selfish nodes. IEEE Transactions on Mobile Computing 14(2), 1162-1175.
  3. Nagar, J. and Sharma, S. 2015. K Barrier Coverage Based Intrusion Detection System for Wireless Networks. In the proceeding of 50th Golden Jubilee Annual Convention of Computer Society of India, 373-385.
  4. Buch, D. and Jinwala, D. 2011. Prevention of wormhole attack in Wireless Sensor Network. International Journal of Network Security & Its Applications (IJNSA) 3(5).
  5. Sharma, S., Mishra, R. and Singh, P. 2015. Authentication in Wireless Networks. In the proceeding of IEEE 2nd International Conference on Computing for Sustainable Global Development, 2031-2035.
  6. Murthy, C. S.R. and Manoj, B.S. 2017. Ad Hoc Wireless Networks-Architecture and Protocols. International Journal of Engineering and Advanced Technology 2(5).
  7. Akyildiz, I.F., Sankarasubramaniam, Y. and Cayirci,E. 2002. Wireless Sensor Networks : A survey. Computer Networks, Elsevier 38(4), 394-422.
  8. Ghazali, K.W.M. and Hassan, R. 2011. Flooding Distributed Denial of Service Attacks-A Review. Journal of Computer Science 7(8), 1218-1223.
  9. Jindal, S. and Maini, R. 2014. Comparative Analysis of Flooding and Jamming Attacks in Wireless Sensor Networks. International Journal of Engineering 3(4), 315-322.
  10. Manjula,V. and Chellappan, C. 2011. The Replication Attack in Wireless Sensor Networks: Analysis and Defenses. Advances in Networks and Communications 132, 169-178.
  11. Oh, S.H., Hong, C.O. and Choi, Y.H. 2012. A malicious and malfunctioning node detection scheme for wireless sensor networks. Wireless sensor network 4(3), 84-90.
  12. Goyal, A. 2014. Selective Packet Drop Attack in MANET-A Review. International Journal of Computer Science and Mobile Computing 3(5), 623-626 .
  13. Nithya, S. and Gomathy, C. 2018. An Investigation on Security Attacks in Wireless Sensor Network. International Journal of Pure and Applied Mathematics 119(15), 927-935.
  14. Dhama, S., Sharma, S. and Saini, M. 2016. Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks. In the proceeding of IEEE 3rd International Conference on Computing for Sustainable Global Development, 2993-2996.
  15. Sharma, S. and Mishra, R. 2014. A Cross Layer Approach for Intrusion Detection in MANETs 93(9), 34-41.
  16. Baadache, A. and Belmehdi, A. 2014. Struggling against simple and cooperative wormhole attacks in multi-hop wireless WSNs networks. Computer Networks 73, 173-184.
  17. Tomic, I. and McCann, J.A. 2017. Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols. IEEE Internet of Things Journal 4(6), 1910 - 1923.
  18. Shanthi, S. and Rajan, E.G. 2016. Comprehensive Analysis of Security Attacks and Intrusion Detection System in Wireless Sensor Networks. International Conference on Next Generation Computing Technologies, 426 - 431.
  19. Sharma, S., Mishra, R. and Singh, K. 2013. A Review on Wireless Network Security. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer 115, 668–681.
  20. Qazi, S., Raad, R., Mu, Y. and Susilo, W. 2018. Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications. Elsevier 39, 31–40.
  21. Shiu and Sheng, Y. 2011. Physical layer security in wireless networks: a tutorial. IEEE Wireless Communications 18(2), 66-74.
  22. Shree, R. and Khan, R.A. 2014. Wormhole Attack in Wireless Sensor Network. International Journal of Computer Networks and Communications Security 2 (1), 22-26.
  23. Amish, P. and Vaghela V.B. 2016. Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol. Procedia Computer Science, Elsevier 79, 700 – 707.
  24. Biradar, S.R., Majumder, K., Sarkar, S.K. and Biradar, P.S.R. 2010. Performance Evaluation and Comparison of AODV and AOMDV. International Journal on Computer Science and Engineering 2(2): 373-377.
  25. Chen, H., Lou, W., Wang , Z., Wu, J., Wan, Z., and Xia, A. 2015. Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, Elsevier 16, 22-35.
  26. Kumar,G., Rai, M.K. and Saha, R. 2017. Securing Range Free Localization against Wormhole Attack using Distance Estimation and Maximum Likelihood Estimation in Wireless Sensor Networks. Journal of Network and Computer Applications 99.
  27. Madria, S. and Yin, J. 2009. SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Net-works 7, 1051–1063.
  28. Bagade, S. and Raisinghani, V. 2016. Jitworm: Jitter monitoring based wormhole attack detection in manet. Information Systems Security, Springer, 444-458.
  29. Govindasamy,J. and Punniakody, S. 2017. A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. Journal of Electrical Systems and Information Technology.
Index Terms

Computer Science
Information Sciences

Keywords

WSN Wormhole attack Round Trip Time AOMDV