Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network

Print
PDF
IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing
© 2016 by IJCA Journal
ICINC 2016 - Number 3
Year of Publication: 2016
Authors:
Siddhesh Khanvilkar
Sandeep B. Raskar

Siddhesh Khanvilkar and Sandeep B Raskar. Article: Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network. IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing ICINC 2016(3):13-18, July 2016. Full text available. BibTeX

@article{key:article,
	author = {Siddhesh Khanvilkar and Sandeep B. Raskar},
	title = {Article: Wormhole Detection and Prevention Authentication based Delay per Hop Technique for Wireless Ad-hoc Network},
	journal = {IJCA Proceedings on International Conference on Internet of Things, Next Generation Networks and Cloud Computing},
	year = {2016},
	volume = {ICINC 2016},
	number = {3},
	pages = {13-18},
	month = {July},
	note = {Full text available}
}

Abstract

In wormhole attack, an attacker node keeps data packets at one location in the network and forward to another attacker node far away by tunneling, which again broadcast them into the network locally. The proposed technique is an efficient detection and prevention method called Wormhole Attack Prevention and Detection Using Authentication Based Delay per Hop Technique for Wireless Network. Detection of wormhole attack is done using number of hops and delay of each node in different paths available in network. The sender node is capable to identify both types of wormhole attacks. Proposed technique detects the legitimate path and path under the wormhole attack. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator.

References

  • S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing protocol Performance issues and Evaluation Considerations January 1999," RFC2501.
  • SaurabhUpadhaya and ArunaBajpai, Avoiding Wormhole Attack in MANET using Statistical Approach, IEEE March 2012
  • Y Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," MobiCom'2000, Boston, Massachusetts, Aug. 6-11, 2000, PP. 275 - 283
  • Ming-Yang Su. Warp: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computer Security, Vol. 29, March 2010
  • RushaNandy and Debdutta Berman Roy, Study if Various Attack in MANET and Elaborative Discussion of Rushing Attack on DSR with clustering scheme, IEEE 13 March 2011
  • ReshmiMaulik and NabenduChaki, A Study of Wormhole Attacks in MANET. International journal of computer information systems and industrial management application 2011 PP. 271-279.
  • Khalil S. Bagchi and N. B. Shro_. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. International Conference on Dependable Systems and Networks, PP 612-621,2005.
  • W. Weichao, B. Bharat, Y. Lu, X. Wu, Wiley Interscience, ?Defending agains Wormhole Attacks in Mobile Ad Hoc Networks,? Wireless Communication and Mobile Computing, January 2006.
  • X. Wang and J. Wong. An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference, PP 39-48, 2007.
  • S. Gupta, S. Kar and S. Dharmaraja, "WHOP: wormhole Attack Detection protocol using hound packet". In the international conference on innovations Technology, IEEE 2011.
  • Y Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless networks," Proc. Of INFOCOM',April 2003, PP. 1976- 1986.
  • H. S. Chiu and K. S. Lui. DELPHI: wormhole detection mechanism for ad hoc wireless networks. 1st International Symposium on Wireless Pervasive Computing, PP 6-11, January 2006