CFP last date
20 May 2024
Reseach Article

Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance

by Ferdinand Alifo, Doe Martin, Mustapha Awinsongya Yakubu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 48
Year of Publication: 2023
Authors: Ferdinand Alifo, Doe Martin, Mustapha Awinsongya Yakubu
10.5120/ijca2023923312

Ferdinand Alifo, Doe Martin, Mustapha Awinsongya Yakubu . Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance. International Journal of Computer Applications. 185, 48 ( Dec 2023), 24-29. DOI=10.5120/ijca2023923312

@article{ 10.5120/ijca2023923312,
author = { Ferdinand Alifo, Doe Martin, Mustapha Awinsongya Yakubu },
title = { Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2023 },
volume = { 185 },
number = { 48 },
month = { Dec },
year = { 2023 },
issn = { 0975-8887 },
pages = { 24-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number48/33015-2023923312/ },
doi = { 10.5120/ijca2023923312 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:29:08.197480+05:30
%A Ferdinand Alifo
%A Doe Martin
%A Mustapha Awinsongya Yakubu
%T Wormhole Attack Vulnerability Assessment of MANETs: Effects on Routing Protocols and Network Performance
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 48
%P 24-29
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discusses Mobile Ad-hoc Networks (MANETs), which are self-organizing networks without infrastructure relying on wireless connections between mobile nodes. The open communication channels in MANETs make them vulnerable to attacks, compromise privacy, and reduce throughput. The paper aims to investigate the impact of wormhole attacks on MANETs, highlighting the significant security threat they pose to wireless networks despite the presence of authentication and confidentiality measures. This paper utilized ns-allinone-2.35-RC7 as a simulation environment to study the effects of introducing wormhole nodes into the network. The DSDV and TORA routing protocols were significantly impacted by wormhole attacks, leading to limited data transmission and a low packet delivery ratio. Conversely, the DSR protocol performed better, demonstrating higher average throughput, successful data transmission, and improved resistance against wormhole attacks.

References
  1. E. Setijadi, I. K. E. Purnama, and M. H. Pumomo, "Performance comparative of AODV, AOMDV and DSDV routing protocols in MANET using NS2," in 2018 international seminar on application for technology of information and communication, 2018: IEEE, pp. 286-289.
  2. E. Setijadi, I. K. E. Purnama, and M. H. Pumomo, "Performance comparative of AODV, AOMDV and DSDV routing protocols in MANET using NS2," in 2018 international seminar on application for technology of information and communication, 2018: IEEE, pp. 286-289.
  3. N. Panda, B. Patra, and S. Hota, "Manet Routing Attacks and Their Countermeasures: A Survey," J. Crit. Rev, vol. 7, pp. 2777-2792, 2020.
  4. F. H. Shajin and P. Rajesh, "Trusted secure geographic routing protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol," International Journal of Pervasive Computing and Communications, vol. 18, no. 5, pp. 603-621, 2022.
  5. M. Tahboush and M. Agoyi, "A hybrid wormhole attack detection in mobile ad-hoc network (MANET)," IEEE Access, vol. 9, pp. 11872-11883, 2021.
  6. B. B. Gupta and A. Dahiya, Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures. CRC press, 2021.
  7. E. Ochola, L. Mejaele, M. Eloff, and J. Van Der Poll, "Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack," SAIEE Africa Research Journal, vol. 108, no. 2, pp. 80-92, 2017.
  8. M. T. Sultan, H. El Sayed, and M. A. Khan, "Performance Analysis of the Impact of DDoS Attack on Routing Protocols in Infrastructure-less Mobile Networks," in 2022 5th International Conference on Communications, Signal Processing, and their Applications (ICCSPA), 2022: IEEE, pp. 1-6.
  9. K.-Y. Tsao, T. Girdler, and V. G. Vassilakis, "A survey of cyber security threats and solutions for UAV communications and flying ad-hoc networks," Ad Hoc Networks, vol. 133, p. 102894, 2022.
  10. Y. Zhuang, Y. Wang, Y. Yan, X. Xu, and Y. Shi, "Reflectrack: Enabling 3d acoustic position tracking using commodity dual-microphone smartphones," in The 34th Annual ACM Symposium on User Interface Software and Technology, 2021, pp. 1050-1062.
  11. A. Mchergui, T. Moulahi, and S. Zeadally, "Survey on artificial intelligence (AI) techniques for vehicular ad-hoc networks (VANETs)," Vehicular Communications, vol. 34, p. 100403, 2022.
  12. A. Norén-Nilsson, "Youth mobilization, power reproduction and Cambodia’s authoritarian turn," Contemporary Southeast Asia, vol. 43, no. 2, pp. 265-292, 2021.
  13. A. Srivastava and J. Prakash, "Future FANET with application and enabling techniques: Anatomization and sustainability issues," Computer science review, vol. 39, p. 100359, 2021.
  14. A. C. J. Malar, M. Kowsigan, N. Krishnamoorthy, S. Karthick, E. Prabhu, and K. Venkatachalam, "Multi constraints applied energy efficient routing technique based on ant colony optimization used for disaster resilient location detection in mobile ad-hoc network," Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 4007-4017, 2021.
  15. M. Rajhi, H. Madkhali, and I. Daghriri, "Comparison and analysis performance in topology-based routing protocols in vehicular ad-hoc network (VANET)," in 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC), 2021: IEEE, pp. 1139-1146.
  16. S. Sarhan and S. Sarhan, "Elephant herding optimization Ad Hoc on-demand multipath distance vector routing protocol for MANET," IEEE Access, vol. 9, pp. 39489-39499, 2021.
  17. G. Kaur and P. Thakur, "Routing protocols in manet: An overview," in 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), 2019, vol. 1: IEEE, pp. 935-941.
  18. S. Basu et al., "A Comparative Study on Propagation Models for Routing Protocols in FANETs," in 2021 IEEE International India Geoscience and Remote Sensing Symposium (InGARSS), 2021: IEEE, pp. 528-531.
  19. P. K. Shrivastava and L. Vishwamitra, "Comparative analysis of proactive and reactive routing protocols in VANET environment," Measurement: Sensors, vol. 16, p. 100051, 2021.
  20. L. Campanile, M. Gribaudo, M. Iacono, F. Marulli, and M. Mastroianni, "Computer network simulation with ns-3: A systematic literature review," Electronics, vol. 9, no. 2, p. 272, 2020.
  21. T. K. Saini and S. C. Sharma, "Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and keyattributes," Ad Hoc Networks, vol. 89, pp. 58-77, 2019.
Index Terms

Computer Science
Information Sciences

Keywords

Security Performance Analysis MANET TORA DSR DSDV Attack Wormhole