Improved secure aware wormhole attack detection in mobile ad-hoc networks
The most challenging process in Mobile Ad-hoc Network (MANET) is detecting the wormhole attacks among various attacks. Most of the routing protocol doesnâ€™t have any defence mechanism against wormhole attacks and thus the presence of such attacks may disrupt the network communication by transmitting the packets to unknown location. Different routing protocols have been proposed for wormhole attack detection and prevention based on the different requirements like hardware, synchronization clocks, etc. To avoid such requirements, a Secure Wormhole Attack Detection (SWAD) technique was proposed based on the maximum end-to-end delay computation between two nodes within the transmission range. However, it does not consider the path length which is significantly reduced by the wormhole attacks. Hence in this article, Improved Secure Wormhole Attack Detection (ISWAD) technique is proposed. In this scheme, length of paths from source to any destination is calculated with the maximum end-to-end delay between nodes. Based on both computations, wormhole links through the network is detected and the data is transmitted via an alternative path available in the routing table. Finally, the simulation results show that proposed ISWAD technique achieves better performance than the existing technique in terms of different network metrics like throughput, jitter, etc.
 Kumar M, & Mishra R (2012), â€œAn overview of MANET: history, challenges and applicationsâ€, Indian Journal of Computer Science and Engineering, 3(1), pp. 121-125.
 Goyal P, Parmar V, & Rishi R (2011), â€œManet: vulnerabilities, challenges, attacks, applicationâ€, IJCEM International Journal of Computational Engineering & Management, 11(2011), pp. 32-37.
 Raghavendran CHV, Satish GN, & Varma PS (2013), â€œSecurity challenges and attacks in mobile ad hoc networksâ€, I.J. Information Engineering and Electronic Business, 3, pp. 49-58. https://doi.org/10.5815/ijieeb.2013.03.06.
 Reddy PN, Vishnuvardhan CH, & Ramesh V (2013), â€œRouting attacks in mobile adhoc networksâ€, International Journal of Computer Science and Mobile Computing, 2(5), pp. 360-367.
 Kaushal S, & Aggarwal R (2015), â€œA study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attackâ€, International Journal of Advanced Research in Computer Engineering & Technology, 4(2), pp. 301-305.
 Nivedha S, & Narayanan SS (2015), â€œDetection and prevention of wormhole attack in MANET using new fresh algorithmâ€, International Journal of Advanced Research in Computer Engineering & Technology, 4(5), pp. 2321-2326.
 Maulik R, & Chaki N (2011), â€œA study on wormhole attacks in MANETâ€, International Journal of Computer Information Systems and Industrial Management Applications, 3, pp. 271-279.
 Thalor J, & Monika M (2013), â€œWormhole attack detection and prevention technique in mobile ad hoc networks: a reviewâ€, International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), pp. 137-142.
 Awad B, & Barhoom T (2015), â€œBT-WAP: Wormhole Attack Prevention Model in MANET Based on Hop-Countâ€, Network, 4(7), pp. 600-606.
 Shrivastava H, & Singh SP (2016), â€œA survey on wormhole attack detection in wireless networkâ€, International Journal of Computer Science and Information Technologies, 7(3), pp. 1273-1276.
 Sharma N, & Singh U (2014), â€œVarious Approaches to Detect Wormhole Attack in Wireless Sensor Networksâ€, International Journal of Computer Science and Mobile Computing, 3(2), pp. 29-33.
 Enshaei M, & Hanapi ZB (2015), â€œA review on wormhole attacks in MANETâ€, Journal of Theoretical and Applied Information Technology, 79(1), pp. 7-21.
 Kaur M, & Kalra S (2016), â€œA survey on wormhole attack detection and prevention techniques in mobile adhoc networksâ€, International Journal of Scope of Computer Research, 5(4), pp. 038-042.
 Arora SK, & Ayushree (2016), â€œDetection and Performance Analysis of Wormhole Attack in MANET using DELPHI Techniqueâ€, International Journal of Security and Its Applications, 10(10), pp. 321-330. https://doi.org/10.14257/ijsia.2016.10.10.28.
 Kaur P, Kaur D, & Mahajan R (2017), â€œWormhole Attack Detection Technique in Mobile Ad Hoc Networksâ€, Wireless Personal Communications, 97(2), pp. 2939-2950. https://doi.org/10.1007/s11277-017-4643-z.
 Azer MA, El-Kassas SM, & El-Soudani MS (2010), â€œAn innovative approach for the wormhole attack detection and prevention in wireless ad hoc networksâ€, In IEEE 2010 International Conference on Networking, Sensing and Control (ICNSC), pp. 366-371. https://doi.org/10.1109/ICNSC.2010.5461523.
 Su MY (2010), â€œWARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networksâ€, Computers & Security, 29(2), pp. 208-224. https://doi.org/10.1016/j.cose.2009.09.005.
 Maurya PK, Sharma G, Sahu V, Roberts A, & Srivastava M (2012), â€œAn overview of AODV routing protocolâ€, International Journal of Modern Engineering Research, 2(3), pp. 728-732.
 Shi F, Jin D, Liu W, & Song J (2011), â€œTime-based detection and location of wormhole attacks in wireless ad hoc networksâ€, In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1721-1726.
 Gupta S, Kar S, & Dharmaraja S (2011), â€œWHOP: Wormhole attack detection protocol using hound packetâ€, In IEEE 2011 international conference on Innovations in information technology (IIT), pp. 226-231. https://doi.org/10.1109/INNOVATIONS.2011.5893822.
 Nayak P, Sahay A, & Pandey Y (2013), â€œDetection and prevention of wormhole attacks in Manets using detection packetâ€, International Journal of Scientific & Engineering Research, 4(6), pp. 1216-1222.
 Chaurasia UK, & Singh V (2013), â€œMAODV: Modified wormhole detection AODV protocolâ€, In IEEE 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 239-243. https://doi.org/10.1109/IC3.2013.6612197.
 Singh Y, Khatkar A, Rani P, & Barak DD (2013), â€œWormhole Attack Avoidance Technique in Mobile Adhoc Networksâ€, In IEEE 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283-287. https://doi.org/10.1109/ACCT.2013.68.
 Poonia R, Sanghi AK, & Singh D (2011), â€œDSR routing protocol in wireless ad-hoc networks: Drop analysisâ€, International Journal of Computer Applications, 14(7), pp. 18-21. https://doi.org/10.5120/1896-2527.
 Kushwaha DS, Singh VK, Singh S, & Sharma S (2014), â€œAn efficient approach for detecting and avoiding wormhole attacks in wireless ad hoc networksâ€, International Journal of Advances in Electronics and Computer Science, 1(2), pp. 39-43.
 Biswas J, Gupta A, & Singh D (2014), â€œWADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocolâ€, In IEEE 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1-6. https://doi.org/10.1109/ICIINFS.2014.7036535.
 Giannetsos T, & Dimitriou T (2014), â€œLDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networksâ€, Journal of Computer and System Sciences, 80(3), pp. 618-643. https://doi.org/10.1016/j.jcss.2013.06.015.