Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET

International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 94 - Number 20
Year of Publication: 2014
Kamini Singh
Gyan Singh
Arpit Agrawal

Kamini Singh, Gyan Singh and Arpit Agrawal. Article: A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET. International Journal of Computer Applications 94(20):1-5, May 2014. Full text available. BibTeX

	author = {Kamini Singh and Gyan Singh and Arpit Agrawal},
	title = {Article: A Trust based Approach for Detecting and Preventing Wormhole Attack in MANET},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {94},
	number = {20},
	pages = {1-5},
	month = {May},
	note = {Full text available}


As in wireless network there is necessity of nodes cooperation to transfer packets from one node to another this property makes it vulnerable to wide range of attacks at different layer. Wormhole attack is one of the most destructive severe attack in which malicious node captures the traffic at particular location and tunnels it to another part of tunnel that is far away. In network security is generally equated by strong and feasible authentication and adopting methods of encryption and decryption. However this attack is hardly defeated as they do not use any additional effort to deploy nor create any extra packets. They simply capture packets then either drop them or replay in existing network, which make them to pass from any type of cryptographic checks and authentication Work done in this field have generally focused on use of additional hardware like directional antenna. In this paper, we present a cluster based counter-measure for the wormhole attack that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Simulation results shown on NS2 display the effectiveness of the proposed method for detecting and preventing wormhole attack.


  • Ajay PrakashRai, VineetSrivastava and Rinkoo Bhatia "Wormhole Attack Detection in Mobile Ad Hoc Networks"in International Journal of Engineering and Innovative Technology (IJEIT), ISSN: 22773754 Volume 2,Issue 2, August 2012.
  • AnjuGill,ChanderDiwaker "Adhoc Network Behavioral Study of Issues And Challenges In Mobile" IJARCSSE, Volume 2, Issue 5, May 2012.
  • C. Siva Ram Murthy and B. S. Manoj"Ad Hoc Wireless Networks Architectures and Protocols".
  • YudhvirSingh,AvniKhatkar, Prabha Rani, Deepika, and DheerDhwaj Barak "Wormhole Attack Avoidance Technique inMobileAdhoc Networks" in IEEE 978-0-7695-4941-5/12 $26. 00 (2013).
  • M . Sookhak ,M. R. Eslaminejad, M. Haghparastand I. in FauziISnin "Detection of Wormhole in Wireless Adhoc networks" IJCST , Volume 2, Issue 7, October 2011.
  • Moutushi Singh, Rupayan Das "A Survey of Different Techniques for Detectionof Wormhole Attack in Wireless Sensor Network" IJSER,Volume 3, Issue 10, October 2012.
  • L. Sudha Rani, R. RajaSekhar (Ph. D) "Detection andPreventation of wormhole in Stateless Multicasting" International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012.
  • Kamini Singh, Gyan Singh "Review on Wormhole Security and Their Detection Scheme" IJARCSSE Volume 4, Issue 1, January 2014.
  • MajidMeghdadi, SuatOzdemir and InanGüler ?A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks? ,in IETETECHNICAL REVIEW,VOL 28 , ISSUE 2 ,MAR-APR 2011.
  • Debdutta Barman Roy, RituparnaChaki, NabenduChaki "A New cluster-Based Wormhole Intrusion Detection Algorithm for MANET"IJNSA, Volume 1 April 2009.
  • YashpalsinghGohil, SumeghaSakhreliya, and SumitraMenaria , "A Review On:detectionand prevention of wormhole attack in MANET" , International Journal of Scientific and Research Publications, Volume 3, Issue 2, ISSN 2250-3153 , February2013.
  • http://harrismare. net/2011/07/14/packet-delivery-ratio-packet-lost-end-to-end-delay.