Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 90 - Number 6
Year of Publication: 2014
Neha Sahu
Deepak Singh Tomar
Neelam Pathak

Neha Sahu, Deepak Singh Tomar and Neelam Pathak. Article: A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET. International Journal of Computer Applications 90(6):1-4, March 2014. Full text available. BibTeX

	author = {Neha Sahu and Deepak Singh Tomar and Neelam Pathak},
	title = {Article: A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {90},
	number = {6},
	pages = {1-4},
	month = {March},
	note = {Full text available}


In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm hole is consider to be a very serious security threat over MANET. In worm hole two selfish node which is geographically very far away to each other, makes tunnel between each other to hide their actual location and try to believe that they are true neighbours and makes conversation through the wormhole tunnel. Recently research will focus over wormhole detection and avoiding path but existing technique having lower network overhead, lower battery power consumption in order to longer survival of network with fast response. This paper introduce a modified AODV protocol that detect and avoid wormhole path over MANET towards secure routing , which is based on an hybrid model that encapsulate location, neighbor node and hop count method.


  • Maulik, R. ; Chaki, N. , "A comprehensive review on wormhole attacks in MANET" IEEE 2010, Page 233-238.
  • Jian Yin, Sanjay Madria, "A hierarchical secure routing protocol against black hole attack in sensor networks", IEEE SUTC, 2006.
  • Xiangyang Li "Wireless Ad Hoc and Sensor Networks: Theory and Applications" Cambridge University Press 978-0-521-86523-4
  • Sebastian Terence J , "Secure Route Discovery against Wormhole Attack in Sensor Networks using Mobile Agents", IEEE 2011, pp 110-115.
  • C. Perkins, E. Belding-Royer, "Ad hoc On-Demand Distance Vector (AODV) Routing," The Internet Society 2003.
  • Sang-min Lee, Keecheon Kim "An Effective Path Recovery Mechanism for AODV Using Candidate Node" springerlink, vol. 4331/2006, 2006.
  • Mahajan, V. ; Natu, M. ; Sethi, A. , "Analysis of wormhole intrusion attacks in MANETS", IEEE 2008, Page 1-7.
  • Keer, S. ; Suryavanshi, A. , "To prevent wormhole attacks using wireless protocol in MANET" IEEE 2010, Page 159-163.
  • K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, "A secure routing protocol for ad hoc networks," in Proc. of IEEE ICNP, 2002.
  • Dang Quan Nguyen ; Lamont, L. , "A Simple and Efficient Detection of Wormhole Attacks", IEEE 2008, Page 1-5.
  • Katrin Hoeper, Guang Gong, "Pre-Authentication and Authentication Models in Ad Hoc Networks," Signals and Communication Technology, pp. 65-82, 2007.
  • Kanika Lakhani, Himani bathla, Rajesh Yadav "A Simulation Model to Secure the Routing Protocol AODV against Black-Hole Attack in MANET" IJCSNS International Journal of Computer Science and Network Security, vol. 10 No. 5, May 2010.