CFP last date
22 April 2024
Reseach Article

The Study of Wormhole Attack in Mobile Ad Hoc Network

by Ruchita Tailor, Jwalant Baria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 87 - Number 18
Year of Publication: 2014
Authors: Ruchita Tailor, Jwalant Baria
10.5120/15308-3941

Ruchita Tailor, Jwalant Baria . The Study of Wormhole Attack in Mobile Ad Hoc Network. International Journal of Computer Applications. 87, 18 ( February 2014), 20-25. DOI=10.5120/15308-3941

@article{ 10.5120/15308-3941,
author = { Ruchita Tailor, Jwalant Baria },
title = { The Study of Wormhole Attack in Mobile Ad Hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 87 },
number = { 18 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume87/number18/15308-3941/ },
doi = { 10.5120/15308-3941 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:15.534934+05:30
%A Ruchita Tailor
%A Jwalant Baria
%T The Study of Wormhole Attack in Mobile Ad Hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 87
%N 18
%P 20-25
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In MANET is a collection of autonomous system of mobile nodes connected with each other using wireless link and each node communicates with each other using wireless link that are within its transmission range. The network is unbounded by any fixed infrastructure or any central authority. The dynamic topology and open nature makes the Mobile Ad Hoc Network more vulnerable to security threats. The success rate of MANET highly depends on the confidence in the security shown by the users. Wormhole attack is one such security threat at network layer which causes routing disruption. The attacker at one point in the network records the packet and forwards it through a high speed tunnel to the other attacker present at distant location giving an false impression to nodes in both the network that they are immediate neighbors. This paper presents a study on wormhole attack and various existing techniques to detect and prevent wormhole attack in MANET.

References
  1. Jeroen Hoebeke, Ingrid Moerman, Bart Dhoedt and Piet Demeester, An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  2. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, Tohoku University and Abbas Jamalipour, University of Sydney, "A Survey of Routing Attacks in Mobile Ad Hc Networks", Security in Wireless Mobile Ad Hoc Networks and Wireless Sensors, IEEE Wireless Communications, October 2007
  3. Viren Mahajan, Maitreya Natu, Adarshpal Sethi, "Analysis of Wromhole Intrusion Attacks in MANETS", University of Dealware, IEEE, 2008.
  4. Jonny Karlsson, Laurence S. Dooley and Göran Pulkkis, "Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm ", Sensors 2013
  5. Yih-Chun Hu, Adrian Perrig, David B. Johnson, "Packet Leashes: A Defence against Wormhole Attacks in Wireless Ad Hoc Networks", IEEE 2003.
  6. Khurana S. , Gupta N. ," FEEPVR: First End-to-End Protocol to Secure Ad hocNetworks with Variable Ranges Against Wormhole Attacks", Proceedings of the 2nd International Conference on Emerging Security Information; Cap Esterel, France. 25–31 August 2008; pp. 74–79.
  7. Gupta N. , Khurana S. , "SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad hocNetworks Against Wormhole Attacks", Proceedings of the 4th International Conference on Wireless and Mobile Communications (ICWMC'08); Athens, Greece. 27 July–1 August 2008; pp. 13–18. "
  8. Chiu H. S. , Lui K. -S. "DelPHI: Wormhole Detection Mechanism for Ad hocWireless Networks. ", Proceedings of the 1st International Symposium on Wireless Pervasive Computing; Phuket, Thailand. 16–18 January 2006.
  9. Phuong Van Tran1, Le Xuan Hung1, Young-Koo Lee1, Sung, Young Lee1, and Heejo Lee2, "TTM: An Efficient Mechansim to Detect Wormhole Attacks in Wireless Ad-Hoc Networks. "
  10. Ming-Yang Su, "WARP:A Wormhole avoidance routing protocol by anamoly detetction mobile ad hoc networks", Miang Chuan Univeristy, Taiwan, Elsevier, 2009
  11. Karlsson, Jonny; Dooley, Laurence S. and Pulkkis, G¨oran (2011). "A new MANET wormhole detection algorithm based on traversal time and hop count analysis. " Sensors, 2011(12), pp. 11122–11140.
  12. Shang-Ming Jen , Chi-Sung Laih and Wen-Chung Kuo, "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", Sensors 2009
  13. Stefano Basagni, Marco Conti, Silvia Giordano, Ivan Stojmenovic, Mobile Ad Hoc Networking, A John Wiley & Sons, Inc. , Publication, 2004
  14. Teerawat Issariyakul, Ekram Hossain, "Introduction to Network Simulator NS2",Springer 2009
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Network (MANET) Network Layer Wormhole attack