skip to main content
10.1145/2905055.2905235acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

An Efficient Approach for Wormhole detection in MANET

Published: 04 March 2016 Publication History

Abstract

A MANET is a collection of self-configured node connected with wireless links. Each node of a mobile ad hoc network acts as a router and finds out a suitable route to forward a packet from source to destination. This network is applicable in areas where establishment of infrastructure is not possible, such as in the military environment. Along with the military environment MANET is also used in civilian environment such as sports stadiums, meeting room. The routing functionality of each node is cause of many security threats on routing. In this paper addressed the problem of identifying and isolating wormhole attack that refuse to forward packets in wireless mobile ad hoc network. The impact of this attack has been shown to be detrimental to network performance, lowering the packet delivery ratio and dramatically increasing the end-to-end delay. Proposed work suggested the efficient and secure routing in MANET. Using this approach of buffer length and RTT calculation, routing overhead minimizes. This research is based on detection and prevention of wormhole attacks in AODV. The proposed protocol is simulated using NS-2 and its performance is compared with the standard AODV protocol. The statistical analysis shows that modified AODV protocol detects wormhole attack efficiently and provides secure and optimum path for routing.

References

[1]
Saleh Ali K.Al-Omari, Putra Sumari, "An overview of mobile adhoc networks for existing protocols and applications", International journal on applications of graph theory in wireless adhoc network and sensor networks, vol. 2, No. 1, march 2010.
[2]
Kamini Singh, Gyan Singh "Review on Wormhole Security and Their Detection Scheme", IJARCSSE Volume 4, Issue 1, January 2014.
[3]
H Yang, H Y. Luo, F Ye, S W. Lu, and L Zhang, "Security in mobile ad hoc networks: Challenges and solutions" (2004), IEEE Wireless Communications. 11 (1), pp. 38--47.
[4]
Request for Comments-3561, C. Perkins Nokia Research Center, E. Belding-Royer University of California, Santa Barbara and S. Das University of Cincinnati July 2003.
[5]
V. Mahajan, M. Natue and A. Sethi, "Analysis of Wormhole Intrusion attacks in MANETs," IEEE Military Communications Conference, pp. 1--7, Nov, 2008.
[6]
Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks", IEEE INFOCOM 2003.
[7]
Kamini Singh, Gyan Singh and Arpit Agrawal, "A Trust based Approach for Detection and Prevention of Wormhole Attack in MANET", International Journal of Computer Applications (0975 --8887) Volume 94 -- No. 20, May 2014.
[8]
Vishal Pahal and Susheel Kumar, "A Cryptographic Handshaking Approach to Prevent Wormhole Attack in MANET", International Journal of Computer Applications (0975-8887) Volume 50 -- No. 2, July 2012.
[9]
Devendra Singh Kushwaha, Ashish Khare and J. L. Rana, "Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET", International Journal of Computer Applications (0975-8887) Volume 62-- No. 7, January 2013.
[10]
Soo-Young Shin and Eddy Hartono Halim, "Wormhole Attacks Detection in MANETs using Routes Redundancy and Time-based Hop Calculation", IEEE, 2012.
  1. An Efficient Approach for Wormhole detection in MANET

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies
      March 2016
      843 pages
      ISBN:9781450339629
      DOI:10.1145/2905055
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 March 2016

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. AODV
      2. MANET
      3. Security
      4. Wormhole attack

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICTCS '16

      Acceptance Rates

      Overall Acceptance Rate 97 of 270 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 79
        Total Downloads
      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 12 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media