CFP last date
20 May 2024
Reseach Article

A Novel Approach for Wormhole Detection in MANET

by Nidhi Nigam, Vishal Sharma, Mahesh Malviya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 7
Year of Publication: 2013
Authors: Nidhi Nigam, Vishal Sharma, Mahesh Malviya
10.5120/10476-5208

Nidhi Nigam, Vishal Sharma, Mahesh Malviya . A Novel Approach for Wormhole Detection in MANET. International Journal of Computer Applications. 63, 7 ( February 2013), 6-11. DOI=10.5120/10476-5208

@article{ 10.5120/10476-5208,
author = { Nidhi Nigam, Vishal Sharma, Mahesh Malviya },
title = { A Novel Approach for Wormhole Detection in MANET },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 7 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number7/10476-5208/ },
doi = { 10.5120/10476-5208 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:13:30.893567+05:30
%A Nidhi Nigam
%A Vishal Sharma
%A Mahesh Malviya
%T A Novel Approach for Wormhole Detection in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 7
%P 6-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The active operational environment of Mobile Ad hoc NETwork (MANET) makes it exposed to a variety of network attacks. Thus reducing the vulnerability is becoming a top priority. Wireless networks are susceptible to many attacks, including an attack known as the wormhole attack, has become a challenging work. The wormhole attack is very powerful and preventing this attack has proven to be very difficult. This paper addresses the aforementioned gap by introducing a new co-operative, relative approach, based on Reference Broadcast System (RBS). To improve network scalability and throughput, we propose the concept of the relative velocity between sender & the receiver node of the MANET. So that our proposed scheme has three mechanisms namely, AODV (Ad hoc on demand distance vector protocol) for routing, Principle of RBS for threshold setting and ACK, for reliability of communication, are combined to detect wormhole attacks in ad hoc networks.

References
  1. C. Siva Ram Murthy and B. S Manoj, Ad Hoc Wireless Networks, Architecture And Protocols( Prentice Hall PTR, 2004).
  2. Nguyen, D. Q. , & Lamont, L, "A Simple and Efficient Detection of Wormhole Attacks". IEEE Conferences New Technologies, Mobility and Security (pp. 1-5). NTMS '08.
  3. Chris, T. , & Steven,"Wireless Sensor Networks: Principles and Applications". Retrieved 18 2, 2011, from MicroStrain: microstrain. com/white/Wilson-chapter-22. pdf
  4. Y. -C. Hu, A. Perrig, D. B. Johnson; "Wormhole Attacks in Wireless Networks"; IEEE Journal on Selected Areas of Communications, vol. 24, numb. 2, pp. 370-380, 2006.
  5. J. Elson, L. Girod, and D. Estrin, "Fine-Grained Network Time Synchronization Using Reference Broadcasts", Proc. 5th Symp. Op. Sys. Design and Implementation, 2002, pp. 147–63.
  6. L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proceedings of the Network and Distributed System Security Symposium.
  7. Yang, H. and Luo, H. and Ye, F. and Lu, S. and Zhang, U. ; "Security in Mobile Ad Hoc Networks: Challenges and Solutions"; Wireless Communications, IEEE, vol. 11, num. 1, pp. 38-47, 2004
  8. Y. -C. Hu, A. Perrig; "A Survey of Secure Wireless Ad Hoc Routing"; Security and Privacy Magazine, IEEE, vol. 2, issue 3, pp. 28-39, May 2004.
  9. T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, A. Qayyum, L. Viennot; "Optimized Link State Routing Protocol"; Proceedings of IEEE INMIC, Pakistan 2001.
  10. Charles E. Perkins and Elizabeth M. Royer. "Ad hoc On-Demand Distance Vector Routing. " Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, pp. 90-100, 1999.
  11. [online] Building ns-2 on Cygwin, http://www. isi. edu/nsnam/ns/ns-cygwin-old. html
  12. [online] OPNET Modeler 11. 0. http://www. opnet. com/products/modeler/home. html
  13. [online]Glomosim– Global Mobile Information Systems Simulation Library. http://pcl. cs. ucla. edu/projects/glomosim
  14. Y. C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM, 2003.
  15. S. Capkun, L. Buttyn, and J. P. Hubaux, "SECTOR: Secure tracking of node encounters in multi-hop wireless networks," in 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003.
  16. Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy,"Dawsen: a defense mechanism against wormhole attacks in wireless sensor networks", IN Second International Conference on Innovations in Information Technology (IIT'05).
  17. N. Song, L. Qian, X. Li, "Wormhole Attack Detection in Wireless Ad Hoc Networks: a Statistical Analysis Approach, Parallel and Distributed Processing" Symposium, 2005, Proceedings of, 19th IEEE International IPDPS'05, 04-08 April 2005, pp.
  18. Khalil, I. , Bagchi, S. , & Shroff, N. B. . " Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks". Computer Networks. Vol 51(15),,2007
  19. Mark Corner and Brian Noble. "Zero-Interaction Authentication". In Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pages 1–11, September 2002.
  20. Charles E. Perkins and Elizabeth M. Royer. "Ad-Hoc On-Demand Distance Vector Routing". In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), pages 90–100, February 1999.
  21. G. S. Mamatha, S. C. Sharma,"A New Secured Approach for MANETS against Network Layer Attacks". First International Conference on Integrated Intelligent Computing,2010, , 978-0-7695-4152-5
Index Terms

Computer Science
Information Sciences

Keywords

AODV MANET wormhole attack relative velocity RBS