Improved secure aware wormhole attack detection in mobile ad-hoc networks

  • Authors

    • Selladevi. M
    • Latha Maheswari. T
    • Duraisamy. S
    https://doi.org/10.14419/ijet.v7i4.21721
  • The most challenging process in Mobile Ad-hoc Network (MANET) is detecting the wormhole attacks among various attacks. Most of the routing protocol doesn’t have any defence mechanism against wormhole attacks and thus the presence of such attacks may disrupt the network communication by transmitting the packets to unknown location. Different routing protocols have been proposed for wormhole attack detection and prevention based on the different requirements like hardware, synchronization clocks, etc. To avoid such requirements, a Secure Wormhole Attack Detection (SWAD) technique was proposed based on the maximum end-to-end delay computation between two nodes within the transmission range. However, it does not consider the path length which is significantly reduced by the wormhole attacks. Hence in this article, Improved Secure Wormhole Attack Detection (ISWAD) technique is proposed. In this scheme, length of paths from source to any destination is calculated with the maximum end-to-end delay between nodes. Based on both computations, wormhole links through the network is detected and the data is transmitted via an alternative path available in the routing table. Finally, the simulation results show that proposed ISWAD technique achieves better performance than the existing technique in terms of different network metrics like throughput, jitter, etc.

  • References

    1. [1] Kumar M, & Mishra R (2012), “An overview of MANET: history, challenges and applicationsâ€, Indian Journal of Computer Science and Engineering, 3(1), pp. 121-125.

      [2] Goyal P, Parmar V, & Rishi R (2011), “Manet: vulnerabilities, challenges, attacks, applicationâ€, IJCEM International Journal of Computational Engineering & Management, 11(2011), pp. 32-37.

      [3] Raghavendran CHV, Satish GN, & Varma PS (2013), “Security challenges and attacks in mobile ad hoc networksâ€, I.J. Information Engineering and Electronic Business, 3, pp. 49-58. https://doi.org/10.5815/ijieeb.2013.03.06.

      [4] Reddy PN, Vishnuvardhan CH, & Ramesh V (2013), “Routing attacks in mobile adhoc networksâ€, International Journal of Computer Science and Mobile Computing, 2(5), pp. 360-367.

      [5] Kaushal S, & Aggarwal R (2015), “A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attackâ€, International Journal of Advanced Research in Computer Engineering & Technology, 4(2), pp. 301-305.

      [6] Nivedha S, & Narayanan SS (2015), “Detection and prevention of wormhole attack in MANET using new fresh algorithmâ€, International Journal of Advanced Research in Computer Engineering & Technology, 4(5), pp. 2321-2326.

      [7] Maulik R, & Chaki N (2011), “A study on wormhole attacks in MANETâ€, International Journal of Computer Information Systems and Industrial Management Applications, 3, pp. 271-279.

      [8] Thalor J, & Monika M (2013), “Wormhole attack detection and prevention technique in mobile ad hoc networks: a reviewâ€, International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), pp. 137-142.

      [9] Awad B, & Barhoom T (2015), “BT-WAP: Wormhole Attack Prevention Model in MANET Based on Hop-Countâ€, Network, 4(7), pp. 600-606.

      [10] Shrivastava H, & Singh SP (2016), “A survey on wormhole attack detection in wireless networkâ€, International Journal of Computer Science and Information Technologies, 7(3), pp. 1273-1276.

      [11] Sharma N, & Singh U (2014), “Various Approaches to Detect Wormhole Attack in Wireless Sensor Networksâ€, International Journal of Computer Science and Mobile Computing, 3(2), pp. 29-33.

      [12] Enshaei M, & Hanapi ZB (2015), “A review on wormhole attacks in MANETâ€, Journal of Theoretical and Applied Information Technology, 79(1), pp. 7-21.

      [13] Kaur M, & Kalra S (2016), “A survey on wormhole attack detection and prevention techniques in mobile adhoc networksâ€, International Journal of Scope of Computer Research, 5(4), pp. 038-042.

      [14] Arora SK, & Ayushree (2016), “Detection and Performance Analysis of Wormhole Attack in MANET using DELPHI Techniqueâ€, International Journal of Security and Its Applications, 10(10), pp. 321-330. https://doi.org/10.14257/ijsia.2016.10.10.28.

      [15] Kaur P, Kaur D, & Mahajan R (2017), “Wormhole Attack Detection Technique in Mobile Ad Hoc Networksâ€, Wireless Personal Communications, 97(2), pp. 2939-2950. https://doi.org/10.1007/s11277-017-4643-z.

      [16] Azer MA, El-Kassas SM, & El-Soudani MS (2010), “An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networksâ€, In IEEE 2010 International Conference on Networking, Sensing and Control (ICNSC), pp. 366-371. https://doi.org/10.1109/ICNSC.2010.5461523.

      [17] Su MY (2010), “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networksâ€, Computers & Security, 29(2), pp. 208-224. https://doi.org/10.1016/j.cose.2009.09.005.

      [18] Maurya PK, Sharma G, Sahu V, Roberts A, & Srivastava M (2012), “An overview of AODV routing protocolâ€, International Journal of Modern Engineering Research, 2(3), pp. 728-732.

      [19] Shi F, Jin D, Liu W, & Song J (2011), “Time-based detection and location of wormhole attacks in wireless ad hoc networksâ€, In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1721-1726.

      [20] Gupta S, Kar S, & Dharmaraja S (2011), “WHOP: Wormhole attack detection protocol using hound packetâ€, In IEEE 2011 international conference on Innovations in information technology (IIT), pp. 226-231. https://doi.org/10.1109/INNOVATIONS.2011.5893822.

      [21] Nayak P, Sahay A, & Pandey Y (2013), “Detection and prevention of wormhole attacks in Manets using detection packetâ€, International Journal of Scientific & Engineering Research, 4(6), pp. 1216-1222.

      [22] Chaurasia UK, & Singh V (2013), “MAODV: Modified wormhole detection AODV protocolâ€, In IEEE 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 239-243. https://doi.org/10.1109/IC3.2013.6612197.

      [23] Singh Y, Khatkar A, Rani P, & Barak DD (2013), “Wormhole Attack Avoidance Technique in Mobile Adhoc Networksâ€, In IEEE 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283-287. https://doi.org/10.1109/ACCT.2013.68.

      [24] Poonia R, Sanghi AK, & Singh D (2011), “DSR routing protocol in wireless ad-hoc networks: Drop analysisâ€, International Journal of Computer Applications, 14(7), pp. 18-21. https://doi.org/10.5120/1896-2527.

      [25] Kushwaha DS, Singh VK, Singh S, & Sharma S (2014), “An efficient approach for detecting and avoiding wormhole attacks in wireless ad hoc networksâ€, International Journal of Advances in Electronics and Computer Science, 1(2), pp. 39-43.

      [26] Biswas J, Gupta A, & Singh D (2014), “WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocolâ€, In IEEE 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1-6. https://doi.org/10.1109/ICIINFS.2014.7036535.

      [27] Giannetsos T, & Dimitriou T (2014), “LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networksâ€, Journal of Computer and System Sciences, 80(3), pp. 618-643. https://doi.org/10.1016/j.jcss.2013.06.015.

  • Downloads

  • How to Cite

    M, S., T, L. M., & S, D. (2018). Improved secure aware wormhole attack detection in mobile ad-hoc networks. International Journal of Engineering & Technology, 7(4), 3472-3477. https://doi.org/10.14419/ijet.v7i4.21721