CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Arresting Wormhole Attack in Ad hoc Network using Cumulative Threshold Transmission Rate

by S. Vijayalakshmi, P. Annadurai
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 54 - Number 18
Year of Publication: 2012
Authors: S. Vijayalakshmi, P. Annadurai
10.5120/8666-2557

S. Vijayalakshmi, P. Annadurai . Arresting Wormhole Attack in Ad hoc Network using Cumulative Threshold Transmission Rate. International Journal of Computer Applications. 54, 18 ( September 2012), 9-14. DOI=10.5120/8666-2557

@article{ 10.5120/8666-2557,
author = { S. Vijayalakshmi, P. Annadurai },
title = { Arresting Wormhole Attack in Ad hoc Network using Cumulative Threshold Transmission Rate },
journal = { International Journal of Computer Applications },
issue_date = { September 2012 },
volume = { 54 },
number = { 18 },
month = { September },
year = { 2012 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume54/number18/8666-2557/ },
doi = { 10.5120/8666-2557 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:01.027094+05:30
%A S. Vijayalakshmi
%A P. Annadurai
%T Arresting Wormhole Attack in Ad hoc Network using Cumulative Threshold Transmission Rate
%J International Journal of Computer Applications
%@ 0975-8887
%V 54
%N 18
%P 9-14
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad hoc network is a collection of mobile nodes that are interconnected via a wireless medium forwards packet to other nodes through multi hop mechanism. The genuine intermediaries relay the packets intended for the indirect radio range destination node. The cooperation existing between the intermediate nodes acts as a strong determinant for successful routing in ad hoc network. The association between these nodes can be weakened by the advent of wormhole adversary inside the network. This adversary tries to deteriorate the routing fabric embedded in this network by short circuiting the normal flow of packets through a resource enriched out of band channel exclusively dedicated for this purpose. Two wormhole adversaries collude to achieve this mission and the strong association between them dampens the robust routing protocols designed for effective routing in ad hoc network. The nefarious nexus between the colluders can be amputated by invoking a host of novel remedial measures as proposed in this paper. The comparison between the Cumulative Transmission Rate and Threshold Transmission Rate, mismatch in ROUTE CACHE value, ACKNOLWDGEMENT packet hop count are a few to thwart the occurrence of wormhole attack in ad hoc network. Deploying a suitable agent to monitor and circumvent the spurious activity if exceeding a specific threshold is also enrolled. Suitable graphs have been simulated to endorse the research idea proposed in this paper.

References
  1. M. Jain, H. Kandwal, "A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks", in the Proceedings of the International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. December 2009,pp. 555-558
  2. Jamil Ibriq, Imad Mahgoub and Mohammad Ilyas, "Secure Routing in Wireless Sensor Networks", 2010, Handbook of Information and Communication Security, Part E, Pages 553-578
  3. Saurabh Upadhyay and Brijesh Kumar Chaurasia, "Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach", Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 1, Volume 84, Advances in Computer Science and Information Technology. Networks and Communications, Part 2, Pages 402-408.
  4. Tassos Dimitriou and Athanassios Giannetsos, "Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks", Lecture Notes in Computer Science, 2010, Volume 6131, Distributed Computing in Sensor Systems, Pages 334-347
  5. Manoj V. , Raghavendiran N. , Aaqib M. and Vijayan R. , "Trust Based Certificate Authority for Detection of Malicious Nodes in MANET", Communications in Computer and Information Science, 1, Volume 269, Global Trends in Computing and Communication Systems, Pages 392-401
  6. Marianne A. Azer, Sherif M. El-Kassas, Magdy S. El-Soudani, "A Full Image of the Wormhole Attacks Towards Introducing Complex Wormhole Attacks in Wireless Ad Hoc Networks", in International Journal of Computer Science and Information Security, Special Issue, May 2009
  7. Azer, M. A. El-Kassas, S. M, El-Soudani, M. S. , "Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks", Fourth International conference on Systems and Networks Communications, 2009. ICSNC '09, 20-25 Sept. 2009
  8. S. Vijayalakshmi, S. Albert Rabara, "Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques – LP3 and NAWA2", International Journal of Computer Applications, (0975 - 8887) Volume 16?? No. 7, February 2011
  9. S. Xu, and V. B. Bopanna, "On Mitigating In-band wormhole Attack s in Mobile Adhoc Networks", ICC, IEEE Communications Society 2007.
  10. J. D. Parmar. , A. D. Patel. , R. H. Jhaveri and B. I. Shah. , "MANET Routing Protocols and Wormhole Attack against AODV", International Journal of Computer Science and Network Security, Vol. 10, No. 4, April 2010.
  11. N. Shanti. , L. Ganesan. , and K. Ramar. , "Study of Different Attacks on Multicast MANET," Journal of Theoretical and Applied Information Technology, 2005-09.
  12. Roy S. , Addada V. G. , Setia S. and Jajodia S. ,"Securing MAODV: Attacks and Countermeasures", Centre for Secure Information Systems, George Mason University, Fairfax, VA 22030.
  13. Yang, H. , Luo, H. , Ye, F. , Lu, S. , and Zhang, L. ,Security in Mobile Ad hoc Networks: Challenges and Solutions", UCLA Computer Science Department.
  14. Marti, S. , Giuli, T. J. , Lai, K. , and Baker, M. ,"Mitigating Routing Misbehavior in Mobile Ad hoc Networks", Department of Computer Science, Stanford University.
  15. Nguyen, H. L. and Nguyen, U. T. , "Different Types of Attacks on Multicast in Mobile Ad hoc Network", Ad hoc Networks 6(2008) pages 32-46.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad hoc Network Wormhole Attack Agent Cumulative Transmission Rate Route Cache Change Rate