Research Article

Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks

by  Priyanka Sharma, H. P. Sinha, Abhay Bindal
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Issue 13
Published: June 2014
Authors: Priyanka Sharma, H. P. Sinha, Abhay Bindal
10.5120/16657-6637
PDF

Priyanka Sharma, H. P. Sinha, Abhay Bindal . Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks. International Journal of Computer Applications. 95, 13 (June 2014), 34-38. DOI=10.5120/16657-6637

                        @article{ 10.5120/16657-6637,
                        author  = { Priyanka Sharma,H. P. Sinha,Abhay Bindal },
                        title   = { Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 95 },
                        number  = { 13 },
                        pages   = { 34-38 },
                        doi     = { 10.5120/16657-6637 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Priyanka Sharma
                        %A H. P. Sinha
                        %A Abhay Bindal
                        %T Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks%T 
                        %J International Journal of Computer Applications
                        %V 95
                        %N 13
                        %P 34-38
                        %R 10.5120/16657-6637
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is one of the major issues in Mobile Ad-hoc Network (MANET) because of its inherent liabilities. Its infrastructure-less network with dynamic topology pose a number of challenges to security design and makes it vulnerable for different types of security attacks. In wormhole attack a pair of colluding nodes makes a tunnel using a high speed network. These colluding nodes create an illusion that the two remote nodes of a MANET are directly connected through nodes that appear to be neighbours, but are actually distant from one another. In this, a secret key is used for encryption and decryption of hello packets. Because of this, the only authentic node will remain in the network, non-authentic nodes (wormhole node) will be discarded. As a result, communication can take place only between the trusted nodes. So malicious node cannot enter into system and communication is secured.

References
  • Pravin Khandare, Prof. N. P. Kulkarni, "Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack", International Journal of Computer Trends and Technology- volume4, Issue3, 2013.
  • Anil Kumar Fatehpuria, Sandeep Raghuwanshi, "An Efficient Wormhole Prevention in MANET Through Digital Signature", International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, 2013.
  • L. Sudha Rani, R. Raja Sekhar (Ph. D), " Detection And Prevention Of Wormhole Attack In Stateless Multicasting", International Journal of Scientific & Engineering Research Volume 3, Issue 3, March 2012.
  • Pushpendra Niranjan, Prashant Srivastava, Raj Kumar Soni, Ram Pratap, " Detection of Wormhole Attack using Hop-count and Time delay Analysis", International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012.
  • N. S. Raote, Mr. K. N. Hande, "Approaches towards Mitigating Wormhole Attack in Wireless Ad-hoc Network", International Journal Of Advanced Engineering Sciences And Technologies Vol. No. 2, issue no. 2, ISSN 2230-7818, pp. 172 – 175, 2011.
  • Nidhi Nigam, Amit Saraf, Chetan Nagar, "A Review New Thread Based Wormhole Attack Prevention Mechanism in MANET", International Journal of Electrical, Electronics & Computer Engineering, ISSN No. 2277-2626, pp: 84-87, 2011
  • Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to Defend Against Wormhole Attack in Ad-hoc Network Using Digital Signature", IEEE 2011.
  • Saurabh Gupta, Subrat Kar, S Dharmaraja, "WHOP: Wormhole Attack Detection Protocol using Hound Packet", International Conference on Innovations in Information Technology, 2011.
  • Mariannne. A. Azer, "Wormhole Attacks Mitigation", Sixth International Conference on Availability, Reliability and Security, 2011.
  • Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, " MANET Routing Protocols and Wormhole attack against AODV", IJCSNS International Journal of Computer Sciences and Network Security,VOL. (4), April 2010.
  • Majid Khabbazian, Hugues Mercier, and Vijay K. Bhargava, "Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad-hoc Networks", IEEE Transaction On Wireless Communications, VOL. 8, Issue 2, 2009.
  • Viren Mahajan, Maitreya Natu, Adarshpal Sethi,"Analysis of Wormhole Intrusion Attack in MANETs", IEEE, 2008.
  • Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, And Nei Kato, "A Survey of Routing Attacks In Mobile Ad Hoc Networks", IEEE Wireless Communications, ISSN No. (1536-1284), pp. 85-91, October 2007.
  • L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W Chang, "Preventing Wormhole Attack on Wireless Ad-hoc Networks: A Graph Theoretic Approach", IEEE Communications Society IEEE, 2005.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

MANET Ad-hoc AODV RREQ RREP Wormhole.

Powered by PhDFocusTM