Skip to main content

Advertisement

Log in

Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With the evolution of numerous secure routing protocols in mobile adhoc network, there is a tradeoff between the security effectiveness against wormhole attack and energy required to support execution of such security protocols using cryptographic approaches. This paper discusses about a novel routing protocol that offers higher degree of energy conservation when exchanging routing information and at the same time offers a joint usage of unicast, multicast and broadcasting services for faster routing update as well as faster communication establishment required from security viewpoint. The presented solution enhances multicast routing and develops a novel control message. It also rectifies the problems of an intermittent links owing to dynamic topology using graph-based approach. Compared with existing routing protocol, the proposed system offers better conservation of energy and satisfactory communication performance in mobile ad-hoc network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Al-Omari, S. A. K., & Sumari, P. (2010). An overview of mobile adhoc networks for the existing protocols and applications. International Journal on Applications of Graph Theory in Wireless Adhoc Networks and Sensor Networks, 2(1), 87–110.

    Article  Google Scholar 

  2. Goyal, P., Parmar, V., & Rishi, R. (2011). MANET: Vulnerabilities, challenges, attacks, application. International Journal of Computational Engineering & Management, 11, 32–37.

    Google Scholar 

  3. Mueller, S., Tsang, R. P., & Ghosal, D. (2004). Multipath routing in mobile ad hoc networks: Issues and challenges. In Springer-Lecture Notes in Computer Science (pp. 209–234).

  4. Upadhayaya, S., & Gandhi, C. (2009). Quality Of service routing in mobile ad hoc networks using location and energy parameters. International Journal of Wireless & Mobile Networks (IJWMN), 1(2), 138–147.

    Google Scholar 

  5. Ali, M. A., Sarwar, Y. (2011). Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions. Master Thesis Computer Science of Blekinge Institute of Technology (pp. 1–65) Sweden.

  6. Balachandran, N. (2012). Surveying solutions to securing on-demand routing protocols in MANETs.International Journal of Advanced Research in Computer and Communication Engineering, 4(1), 1486–1491.

    Google Scholar 

  7. Guirguis, S. K., & Saaid, O. S. (2012). Evaluating the performance of secure routing protocols in mobile ad-hoc networks. International Journal of Advanced Research in Computer and Communication Engineering, 1(9), 710–716.

    Google Scholar 

  8. Kukreja, D., Singh, U., & Reddy, B. V. R. (2013). A survey of trust based routing protocols in MANETs. Journal of Advances in Computer Networks, 1(4), 280–285.

    Google Scholar 

  9. Geetha, S. B., & Patil, V. C.(2015). Evaluating the research trends and techniques for addressing wormhole attack in MANET. International Journal of Computer Applications, 110(6), 1–11.

    Article  Google Scholar 

  10. Li, Z., Pu, D., Wang, W., & Wyglinski, A. (2011). Forced collision: Detecting wormhole attacks with physical layer network coding. IEEE-Tsinghua Science And Technology, 6(5), 505–519.

    Article  Google Scholar 

  11. Upadhyay, S., & Bajpai, A. (2012). Avoiding wormhole attack in MANET using statistical analysis approach. International Journal on Cryptography and Information Security, 2(1), 15–23.

    Article  Google Scholar 

  12. Yi, J., & Clausen, T. (2014). Collection tree extension of reactive routing protocol for low-power and lossy networks. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, 10, 1–12.

    Google Scholar 

  13. Wang, F., Wang, F., Huang, B., & Yang, L. T. (2010). COSR: A reputation—based secure route protocol in MANET. EURASIP Journal on Wireless Communications and Networking, 7, 890–893.

    Google Scholar 

  14. Kim, D., Kim, H., Kim, G., & Kim, S. (2013). A counterattack-detection scheme in transmission time-based wormhole detection methods. Hindawi Publishing Corporation-International Journal of Distributed Sensor Networks, 9, 184931.

    Article  Google Scholar 

  15. Stoleru, R., Wu, H., & Chenji, H. (2012). Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Elsevier-Adhoc Networks, 10, 1179–1190.

    Article  Google Scholar 

  16. Dwivedi, S., & Tripathi, P. (2014). An efficient approach for detection of wormhole attack in mobile ad-hoc network. International Journal of Computer Applications, 104(7), 18–23.

    Article  Google Scholar 

  17. Matam, R., & Tripathy, S. (2013). WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP Journal onWireless Communications and Networking, 180, 1–12.

    Google Scholar 

  18. Roy, D. B., Chaki, R., & Chaki, N. (2009). A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks. International Journal of Network Security & Its Applications (IJNSA), 1(1), 44–52.

    Google Scholar 

  19. Nivedha, S., & Narayanan, S. S. (2015). Detection and prevention of wormhole attack in MANET using new fresh algorithm. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 4(5), 2321–2326.

    Google Scholar 

  20. Vandana, C.P., & Devaraj, A. F. S. (2013). MLDW—A multilayered detection mechanism for wormhole attack in AODV based MANET. International Journal of Security, Privacy and Trust Management (IJSPTM), 2(3), 29–41.

    Article  Google Scholar 

  21. Vu, H., Kulkarni, A., Sarac, K., & Mittal, N. (2008). WORMEROS: A new framework for defending against wormhole attacks on wireless ad hoc networks. International Conference on Wireless Algorithms, Systems, and Applications (WASA), 5258, 491–502.

    Article  Google Scholar 

  22. Vijayalakshmi, S., & Rabara, S. A. (2011). Weeding wormhole attack in MANET multicast routing using two novel techniques—LP3 and NAWA2. International Journal of Computer Applications, 16(7), 26–33.

    Article  Google Scholar 

  23. Qabajeh, L. K.., & Kiah, L. M. (2011). Secure unicast position-based routing protocols for ad-hoc networks. Report of Acta Polytechnica Hungarica, 8(6), 191–214.

    Google Scholar 

  24. Yu, P. H., & Pooch, U. W. (2011).Security and dynamic encryption system in mobile ad-hoc network. IntechOpen, 23, 470–490.

    Google Scholar 

  25. Hu, Y.-C., Johnson, D. B., & Perrig, A. (2002). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (pp. 175–192).

  26. Lai, W.-S., Lin, C.-H., & Liu, J.-C. (2008). I-SEAD: A secure routing protocol for mobile ad hoc networks. International Journal of Multimedia Ubiquitous Engineering, 3(4), 1–13.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. B. Geetha.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Geetha, S.B., Patil, V.C. Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network. Wireless Pers Commun 97, 859–880 (2017). https://doi.org/10.1007/s11277-017-4541-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4541-4

Keywords

Navigation