Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 7
Year of Publication: 2014
Authors:
Shivangi Dwivedi
Priyanka Tripathi
10.5120/18214-9172

Shivangi Dwivedi and Priyanka Tripathi. Article: An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network. International Journal of Computer Applications 104(7):18-23, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Shivangi Dwivedi and Priyanka Tripathi},
	title = {Article: An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {7},
	pages = {18-23},
	month = {October},
	note = {Full text available}
}

Abstract

Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree of mobility. In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. In such networks, the wireless mobile nodes may dynamically enter the network as well as go-ahead the network. Mobile ad hoc network is a group of many more devices or nodes with the capability of communication and networking. MANET encounter by number of security threat because of its open entrusted environment with little security settlement, even if security over MANET is not to be enhance up to satisfactory level because of its characteristics Security is an essential service for wired and wireless network communication. Due to its mobility and self routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layers, Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbors and makes conversation through the wormhole tunnel. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. For wormhole attack to have a best impact on the wired or wireless network, it must fascinate a huge amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem of wormhole attack.

References

  • Maulik, R. ; Chaki, N. , "A comprehensive review on wormhole attacks in MANET" IEEE 2010, Page 233-238.
  • Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE, 2011
  • Perkins C. and Bhagwat P. : Highly dynamic destination-sequence distance vector routing (DSDV) for mobile computers, In Proceedings of ACM Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM 94), London, UK, pp. 234-244 (1994)
  • Upadhyay S. and Chaurasia B. K. : Detecting and Avoiding Wormhole Attack in MANET using Statistical Analysis Approach, In the Second International Conference on Computer Science and Information Technology (CCSIT- 2012), Springer, pp. (2012).
  • Devinder Pal Singh et al. ,' INVESTIGATING THE EFFECT OF WORMHOLE ATTACK ON AODV in 2012.
  • Azer, M. A. , El-Kassas S. M. , Hassan, A. W. F. , El-Soudani M. S. , "Intrusion Detection for Wormhole Attacks in Ad hoc Networks a Survey and a proposed Decentralized Scheme Marianne " IEEE Third International conference on Availability, Reliability and Security, 2008.
  • K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks," The International Journal of Computer and Telecommunications Networking vol. 51, pp. 3750-3772, 2007.
  • S. Choi, D. Kim, D. Lee, J. Jung, "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks", Int'l conf. on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343- 348, 2008.
  • Mahajan, V. Natu, M. Sethi, A, "Analysis of wormhole intrusion attacks in MANETS", IEEE Military Communications Conference, (MILCOM), pp. 1-7, 2008.
  • S. Marti et al. "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of Sixth Annual IEEE/ACM Intl. Conference on Mobile Computing and Networking , April 2009,PP. 225-256
  • Jie Zhou1, Jiannong Cao, Jun Zhang1, Chisheng Zhang and Yao Yu, "Analysis and Countermeasure for Wormhole Attacks in Wireless Mesh Networks on a Real Test bed" in 26th IEEE International Conference on Advanced Information Networking and Applications,2012
  • Pallavi Sharma, Prof. Aditya Trivedi "An Approach to Defend Against Wormhole Attack in Ad Hoc Network Using Digital Signature" in IEEE , 2011
  • Sanjay Kumar Dhurandher and Isaac Woungang "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks" in 26th International Conference on Advanced Information Networking and Applications Workshops in IEEE, 2012
  • X. Wang & J. Wong, (2007) "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks", 31st Annual International Computer Software and Applications Conference - Vol. 1 - (COMPSAC 2007), pp. 39-48.
  • H. S. Chiu & K. S. Lui, (2006) "Delphi: Wormhole Detection Mechanism for Ad Hoc Wireless Networks", Proc. of International Symposium on Wireless Pervasive Computing, pp-6-pp.
  • Lazes, L. ; Poovendran, R. ; Meadows, C. ; Syverson, P. ; Chang, L. W. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In IEEE WCNC 2005, Seattle, WA, USA, 2005; pp. 1193–1199.
  • Lazes, L. ; Poovendran, R. ; Meadows, C. ; Syverson, P. ; Chang, L. W. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In IEEE WCNC 2005, Seattle, WA, USA, 2005; pp. 1193–1199.
  • Hu, Y. C. ; Perrig, A. ; Johnson, D. B. Wormhole Attacks in Wireless Networks. IEEE J. Sel. Area Comm. 2006, 24, 370–38