Call for Paper - May 2023 Edition
IJCA solicits original research papers for the May 2023 Edition. Last date of manuscript submission is April 20, 2023. Read More

The Study of Wormhole Attack in Mobile Ad Hoc Network

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 87 - Number 18
Year of Publication: 2014
Ruchita Tailor
Jwalant Baria

Ruchita Tailor and Jwalant Baria. Article: The Study of Wormhole Attack in Mobile Ad Hoc Network. International Journal of Computer Applications 87(18):20-25, February 2014. Full text available. BibTeX

	author = {Ruchita Tailor and Jwalant Baria},
	title = {Article: The Study of Wormhole Attack in Mobile Ad Hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {87},
	number = {18},
	pages = {20-25},
	month = {February},
	note = {Full text available}


In MANET is a collection of autonomous system of mobile nodes connected with each other using wireless link and each node communicates with each other using wireless link that are within its transmission range. The network is unbounded by any fixed infrastructure or any central authority. The dynamic topology and open nature makes the Mobile Ad Hoc Network more vulnerable to security threats. The success rate of MANET highly depends on the confidence in the security shown by the users. Wormhole attack is one such security threat at network layer which causes routing disruption. The attacker at one point in the network records the packet and forwards it through a high speed tunnel to the other attacker present at distant location giving an false impression to nodes in both the network that they are immediate neighbors. This paper presents a study on wormhole attack and various existing techniques to detect and prevent wormhole attack in MANET.


  • Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  • Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Tohoku University and Abbas Jamalipour, University of Sydney, "A Survey of Routing Attacks in Mobile Ad Hc Networks", Security in Wireless Mobile Ad Hoc Networks and Wireless Sensors, IEEE Wireless Communications, October 2007
  • Viren Mahajan, Maitreya Natu, Adarshpal Sethi, "Analysis of Wromhole Intrusion Attacks in MANETS", University of Dealware, IEEE, 2008.
  • Jonny Karlsson, Laurence S. Dooley and Göran Pulkkis, "Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm ", Sensors 2013
  • Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks", IEEE 2003.
  • Khurana S. , Gupta N. ," FEEPVR: First End-to-End Protocol to Secure Ad hocNetworks with Variable Ranges Against Wormhole Attacks", Proceedings of the 2nd International Conference on Emerging Security Information; Cap Esterel, France. 25–31 August 2008; pp. 74–79.
  • Gupta N. , Khurana S. , "SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad hocNetworks Against Wormhole Attacks", Proceedings of the 4th International Conference on Wireless and Mobile Communications (ICWMC'08); Athens, Greece. 27 July–1 August 2008; pp. 13–18. "
  • Chiu H. S. , Lui K. -S. "DelPHI: Wormhole Detection Mechanism for Ad hocWireless Networks. ", Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. 16–18 January 2006.
  • Phuong Van Tran1, Le Xuan Hung1, Young-Koo Lee1, Sung, Young Lee1, and Heejo Lee2, "TTM: An Efficient Mechansim to Detect Wormhole Attacks in Wireless Ad-Hoc Networks. "
  • Ming-Yang Su, "WARP:A Wormhole avoidance routing protocol by anamoly detetction mobile ad hoc networks", Miang Chuan Univeristy, Taiwan, Elsevier, 2009
  • Karlsson, Jonny; Dooley, Laurence S. and Pulkkis, G¨oran (2011). "A new MANET wormhole detection algorithm based on traversal time and hop count analysis. " Sensors, 2011(12), pp. 11122–11140.
  • Shang-Ming Jen , Chi-Sung Laih and Wen-Chung Kuo, "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", Sensors 2009
  • Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic, Mobile Ad Hoc Networking, A John Wiley & Sons, Inc. , Publication, 2004
  • Teerawat Issariyakul, Ekram Hossain, "Introduction to Network Simulator NS2",Springer 2009