Full Paper View Go Back

Detection and Elimination of Wormhole Attacks in a MANET

A.Vani 1

  1. Dept. of ECE, Chaitanya Bharathi Institute of Technology (Autonomous), Hyderabad, India.

Correspondence should be addressed to: vanialamur@cbit.ac.in.


Section:Research Paper, Product Type: Isroset-Journal
Vol.5 , Issue.5 , pp.35-40, Oct-2017


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v5i5.3540


Online published on Oct 30, 2017


Copyright © A.Vani . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.Vani, “Detection and Elimination of Wormhole Attacks in a MANET,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.5, pp.35-40, 2017.

MLA Style Citation: A.Vani "Detection and Elimination of Wormhole Attacks in a MANET." International Journal of Scientific Research in Computer Science and Engineering 5.5 (2017): 35-40.

APA Style Citation: A.Vani, (2017). Detection and Elimination of Wormhole Attacks in a MANET. International Journal of Scientific Research in Computer Science and Engineering, 5(5), 35-40.

BibTex Style Citation:
@article{_2017,
author = {A.Vani},
title = {Detection and Elimination of Wormhole Attacks in a MANET},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {5},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {35-40},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=472},
doi = {https://doi.org/10.26438/ijcse/v5i5.3540}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i5.3540}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=472
TI - Detection and Elimination of Wormhole Attacks in a MANET
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - A.Vani
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 35-40
IS - 5
VL - 5
SN - 2347-2693
ER -

646 Views    322 Downloads    149 Downloads
  
  

Abstract :
Wormhole attacks in Mobile ad hoc networks is impermeable to traditional security measures. The attack can be launched regardless of the MAC, routing, or security protocol used in the network. Two or more malicious nodes in conspiracy usually perform the wormhole attack. Two malicious nodes at different locations send received routing messages to each other via a secrete channel. In this way, although the two malicious nodes are located far from each other, they appear to be within one-hop communications range. Wormhole nodes can successfully execute such attacks without compromising any computer, and are inevitable even though some ad hoc wireless networks provide authenticity and confidentiality protection. Practically all widespread security extensions are proposed for popular routing protocols but they do not alleviate wormhole attacks. However, since wormhole attack such a severe thread to MANET security. In this situation wormhole attack methodology presented is motivated by WARP and the same procedure and terminology is used but slight modification In this work wormhole attack is detected and eliminated by simply modifying AODV routing protocol and its performance is measured.

Key-Words / Index Term :
MANET, Routing, AODV, Wormhole attack, WARP

References :
[1] Hu Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks," in In Proce. of IEEE INFOCOM, 2003.
[2] H. Yih-Chun, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, 2006.
[3] S. Capkun, L. Buttya`n, and J.-P. Hubaux, “Sector: secure tracking of node encounters in multi-hop wireless networks," in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. Fairfax, Virginia: ACM, 2003, 986862 21-32.
[4] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks," in Network and Distributed System Security Symposium (NDSS), San Diego, 2004.
[5] I. Khalil, S. Bagchi, and N. B. Shroff, “Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 16. 51, no. 13, pp.3750-3772, 2007, 1276793.
[6] I. Khalil, S. Bagchi, and N. B. Shroff, “Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Netw., vol. 6, no. 3, pp. 344-362, 2008, 1328997.
[7] L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput. Appl.,vol. 30, no. 1, pp. 308-330, 2007.
[8] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information," in INFOCOM 2007. 26th IEEE Internation2.4.1.1al Conference on Computer Communications. IEEE, J. Gao, Ed., 2007, pp.107-115 .
[9] X. Su and R. V. Boppana, “On mitigating in-band wormhole attacks in mobile ad hoc networks," in Communications, 2007. ICC `07. IEEE International Conference on, R. V. Boppana, Ed., 2007, pp. 1136-1141.
[10] H. Vu, A. Kulkarni, K. Sarac, and N. Mittal, “Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks," in In Proc. of the Third International Conference on Wireless Algorithms, Systems, and Applications, 2008.
[11] X. Wang and J. Wong, “An end-to-end detection of wormhole attack in wireless ad-hoc networks," in In Proc. of International Conference on Computer Software and Applications, 2007.
[12] Ning Song, Lijun Qian, and Xiangfang Li. Wormhole attacks detection in wireless IEEE international parallel and distributed processing symposium (IPDPS’05); 2005.
[13] Hon Sun Chiu, King-Shan Lui. DelPHI: wormhole detection mechanism for ad hoc wireless networks. In the proceedings of the 1st international symposium on wireless pervasive computing; 2006.
[14] P. Dhivya and S. Meenakshi, "A Review of Congestion Control Techniques in Mobile Ad-hoc Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.44-49, 2015.
[15] G.Kalpana and S.Archana, "Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.133-138, 2015.
[16] Ming-Yang Su “WARP: A Wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”, COMPUTERS & SECURITY 29 (2010) 208-224.
[17] Mahesh K.Marina and Samir R.Das., “On-demand multipath distance vector routing in ad hoc networks”, In the proceedings of the IEEE international conference on network protocols(ICNP);2001.pp.14-23.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation