CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET

by Devendra Singh Kushwasha, Ashish Khare, J. L. Rana
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 62 - Number 7
Year of Publication: 2013
Authors: Devendra Singh Kushwasha, Ashish Khare, J. L. Rana
10.5120/10094-4732

Devendra Singh Kushwasha, Ashish Khare, J. L. Rana . Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET. International Journal of Computer Applications. 62, 7 ( January 2013), 21-25. DOI=10.5120/10094-4732

@article{ 10.5120/10094-4732,
author = { Devendra Singh Kushwasha, Ashish Khare, J. L. Rana },
title = { Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { January 2013 },
volume = { 62 },
number = { 7 },
month = { January },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume62/number7/10094-4732/ },
doi = { 10.5120/10094-4732 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:11:09.291850+05:30
%A Devendra Singh Kushwasha
%A Ashish Khare
%A J. L. Rana
%T Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 62
%N 7
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc networks are comprised of nodes that must cooperate to dynamically establish routes using wireless links. Routes may involve multiple hops with each node acting as a host and router. Since ad hoc networks typically work in an open un-trusted environment with little physical security, they are subject to a number of unique security attacks like wormhole attack. The wormhole attack is considered to be a serious security attack in multi-hop ad hoc networks. In wormhole attack, attacker makes tunnel from one end of the network to the other, nodes stay in different location on two ends of tunnel believe that they are true neighbours and makes conversation through the wormhole link. Unlike many other attacks on ad-hoc routing, a wormhole attack cannot be prevented with cryptographic solutions because intruders neither generate new, nor modify existing, packets, but rather forward existing ones. In this paper a simple technique to effectively detect wormhole attacks without the need for special hardware and/or strict location or synchronization requirements is proposed. The proposed technique makes use of variance in routing information between neighbours to detect wormholes. The base of dissertation is to find alternative path from source to second hop and calculate the number of hops to detect the wormhole.

References
  1. "Wireless Networks," wikipedia. org, [Online] Available: network [Accessed: nov, 2012].
  2. Xiangyang Li "Wireless Ad Hoc and Sensor Networks: Theory and Applications" Cambridge University Press 978-0-521-86523-4
  3. Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  4. Kanika Lakhani, Himani bathla, Rajesh Yadav "A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET" IJCSNS International Journal of Computer Science and Network Security, vol. 10 No. 5, May 2010.
  5. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, "A secure routing protocol for ad hoc networks," in Proc. of IEEE ICNP, 2002.
  6. Sang-min Lee, Keecheon Kim "An Effective Path Recovery Mechanism for AODV Using Candidate Node" springerlink, vol. 4331/2006, 2006.
  7. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. of IEEE INFOCOM, 2003.
  8. R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information," in Proc. of IEEE INFOCOM, 2007.
  9. I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Computer Network, vol. 51, no. 13, pp. 3750–3772, 2007.
  10. W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wireless Communication Mobile Computing, vol. 6, no. 4, pp. 483–503, 2006.
  11. X. Su and R. V. Boppana, "On mitigating in-band wormhole attacks in mobile ad hoc networks," in Proc. of IEEE ICC, 2007.
  12. Yih-Chun Hu, Adrian Perrig, and David B. Johnson, "Wormhole Attacks in Wireless Networks"
  13. C. Perkins, E. Belding-Royer, "Ad hoc On-Demand Distance Vector (AODV) Routing," The Internet Society 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Adhoc network wormhole threshold AODV