CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks

by Priyanka Sharma, H. P. Sinha, Abhay Bindal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 13
Year of Publication: 2014
Authors: Priyanka Sharma, H. P. Sinha, Abhay Bindal
10.5120/16657-6637

Priyanka Sharma, H. P. Sinha, Abhay Bindal . Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks. International Journal of Computer Applications. 95, 13 ( June 2014), 34-38. DOI=10.5120/16657-6637

@article{ 10.5120/16657-6637,
author = { Priyanka Sharma, H. P. Sinha, Abhay Bindal },
title = { Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 13 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number13/16657-6637/ },
doi = { 10.5120/16657-6637 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:19:24.013432+05:30
%A Priyanka Sharma
%A H. P. Sinha
%A Abhay Bindal
%T Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 13
%P 34-38
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusion that the two remote nodes of a MANET are directly connected through nodes that appear to be neighbours, but are actually distant from one another. In this, a secret key is used for encryption and decryption of hello packets. Because of this, the only authentic node will remain in the network, non-authentic nodes (wormhole node) will be discarded. As a result, communication can take place only between the trusted nodes. So malicious node cannot enter into system and communication is secured.

References
  1. Pravin Khandare, Prof. N. P. Kulkarni, "Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack", International Journal of Computer Trends and Technology- volume4, Issue3, 2013.
  2. Anil Kumar Fatehpuria, Sandeep Raghuwanshi, "An Efficient Wormhole Prevention in MANET Through Digital Signature", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, 2013.
  3. L. Sudha Rani, R. Raja Sekhar (Ph. D), " Detection And Prevention Of Wormhole Attack In Stateless Multicasting", International Journal of Scientific & Engineering Research Volume 3, Issue 3, March 2012.
  4. Pushpendra Niranjan, Prashant Srivastava, Raj Kumar Soni, Ram Pratap, " Detection of Wormhole Attack using Hop-count and Time delay Analysis", International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012.
  5. N. S. Raote, Mr. K. N. Hande, "Approaches towards Mitigating Wormhole Attack in Wireless Ad-hoc Network", International Journal Of Advanced Engineering Sciences And Technologies Vol. No. 2, issue no. 2, ISSN 2230-7818, pp. 172 – 175, 2011.
  6. Nidhi Nigam, Amit Saraf, Chetan Nagar, "A Review New Thread Based Wormhole Attack Prevention Mechanism in MANET", International Journal of Electrical, Electronics & Computer Engineering, ISSN No. 2277-2626, pp: 84-87, 2011
  7. Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad-hoc Network Using Digital Signature", IEEE 2011.
  8. Saurabh Gupta, Subrat Kar, S Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet", International Conference on Innovations in Information Technology, 2011.
  9. Mariannne. A. Azer, "Wormhole Attacks Mitigation", Sixth International Conference on Availability, Reliability and Security, 2011.
  10. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, " MANET Routing Protocols and Wormhole attack against AODV", IJCSNS International Journal of Computer Sciences and Network Security,VOL. (4), April 2010.
  11. Majid Khabbazian, Hugues Mercier, and Vijay K. Bhargava, "Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad-hoc Networks", IEEE Transaction On Wireless Communications, VOL. 8, Issue 2, 2009.
  12. Viren Mahajan, Maitreya Natu, Adarshpal Sethi,"Analysis of Wormhole Intrusion Attack in MANETs", IEEE, 2008.
  13. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, "A Survey of Routing Attacks In Mobile Ad Hoc Networks", IEEE Wireless Communications, ISSN No. (1536-1284), pp. 85-91, October 2007.
  14. L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W Chang, "Preventing Wormhole Attack on Wireless Ad-hoc Networks: A Graph Theoretic Approach", IEEE Communications Society IEEE, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Ad-hoc AODV RREQ RREP Wormhole.