Improved secure aware wormhole attack detection in mobile ad-hoc networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The most challenging process in Mobile Ad-hoc Network (MANET) is detecting the wormhole attacks among various attacks. Most of the routing protocol doesn’t have any defence mechanism against wormhole attacks and thus the presence of such attacks may disrupt the network communication by transmitting the packets to unknown location. Different routing protocols have been proposed for wormhole attack detection and prevention based on the different requirements like hardware, synchronization clocks, etc. To avoid such requirements, a Secure Wormhole Attack Detection (SWAD) technique was proposed based on the maximum end-to-end delay computation between two nodes within the transmission range. However, it does not consider the path length which is significantly reduced by the wormhole attacks. Hence in this article, Improved Secure Wormhole Attack Detection (ISWAD) technique is proposed. In this scheme, length of paths from source to any destination is calculated with the maximum end-to-end delay between nodes. Based on both computations, wormhole links through the network is detected and the data is transmitted via an alternative path available in the routing table. Finally, the simulation results show that proposed ISWAD technique achieves better performance than the existing technique in terms of different network metrics like throughput, jitter, etc.


  • References


      [1] Kumar M, & Mishra R (2012), “An overview of MANET: history, challenges and applications”, Indian Journal of Computer Science and Engineering, 3(1), pp. 121-125.

      [2] Goyal P, Parmar V, & Rishi R (2011), “Manet: vulnerabilities, challenges, attacks, application”, IJCEM International Journal of Computational Engineering & Management, 11(2011), pp. 32-37.

      [3] Raghavendran CHV, Satish GN, & Varma PS (2013), “Security challenges and attacks in mobile ad hoc networks”, I.J. Information Engineering and Electronic Business, 3, pp. 49-58. https://doi.org/10.5815/ijieeb.2013.03.06.

      [4] Reddy PN, Vishnuvardhan CH, & Ramesh V (2013), “Routing attacks in mobile adhoc networks”, International Journal of Computer Science and Mobile Computing, 2(5), pp. 360-367.

      [5] Kaushal S, & Aggarwal R (2015), “A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack”, International Journal of Advanced Research in Computer Engineering & Technology, 4(2), pp. 301-305.

      [6] Nivedha S, & Narayanan SS (2015), “Detection and prevention of wormhole attack in MANET using new fresh algorithm”, International Journal of Advanced Research in Computer Engineering & Technology, 4(5), pp. 2321-2326.

      [7] Maulik R, & Chaki N (2011), “A study on wormhole attacks in MANET”, International Journal of Computer Information Systems and Industrial Management Applications, 3, pp. 271-279.

      [8] Thalor J, & Monika M (2013), “Wormhole attack detection and prevention technique in mobile ad hoc networks: a review”, International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), pp. 137-142.

      [9] Awad B, & Barhoom T (2015), “BT-WAP: Wormhole Attack Prevention Model in MANET Based on Hop-Count”, Network, 4(7), pp. 600-606.

      [10] Shrivastava H, & Singh SP (2016), “A survey on wormhole attack detection in wireless network”, International Journal of Computer Science and Information Technologies, 7(3), pp. 1273-1276.

      [11] Sharma N, & Singh U (2014), “Various Approaches to Detect Wormhole Attack in Wireless Sensor Networks”, International Journal of Computer Science and Mobile Computing, 3(2), pp. 29-33.

      [12] Enshaei M, & Hanapi ZB (2015), “A review on wormhole attacks in MANET”, Journal of Theoretical and Applied Information Technology, 79(1), pp. 7-21.

      [13] Kaur M, & Kalra S (2016), “A survey on wormhole attack detection and prevention techniques in mobile adhoc networks”, International Journal of Scope of Computer Research, 5(4), pp. 038-042.

      [14] Arora SK, & Ayushree (2016), “Detection and Performance Analysis of Wormhole Attack in MANET using DELPHI Technique”, International Journal of Security and Its Applications, 10(10), pp. 321-330. https://doi.org/10.14257/ijsia.2016.10.10.28.

      [15] Kaur P, Kaur D, & Mahajan R (2017), “Wormhole Attack Detection Technique in Mobile Ad Hoc Networks”, Wireless Personal Communications, 97(2), pp. 2939-2950. https://doi.org/10.1007/s11277-017-4643-z.

      [16] Azer MA, El-Kassas SM, & El-Soudani MS (2010), “An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks”, In IEEE 2010 International Conference on Networking, Sensing and Control (ICNSC), pp. 366-371. https://doi.org/10.1109/ICNSC.2010.5461523.

      [17] Su MY (2010), “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”, Computers & Security, 29(2), pp. 208-224. https://doi.org/10.1016/j.cose.2009.09.005.

      [18] Maurya PK, Sharma G, Sahu V, Roberts A, & Srivastava M (2012), “An overview of AODV routing protocol”, International Journal of Modern Engineering Research, 2(3), pp. 728-732.

      [19] Shi F, Jin D, Liu W, & Song J (2011), “Time-based detection and location of wormhole attacks in wireless ad hoc networks”, In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1721-1726.

      [20] Gupta S, Kar S, & Dharmaraja S (2011), “WHOP: Wormhole attack detection protocol using hound packet”, In IEEE 2011 international conference on Innovations in information technology (IIT), pp. 226-231. https://doi.org/10.1109/INNOVATIONS.2011.5893822.

      [21] Nayak P, Sahay A, & Pandey Y (2013), “Detection and prevention of wormhole attacks in Manets using detection packet”, International Journal of Scientific & Engineering Research, 4(6), pp. 1216-1222.

      [22] Chaurasia UK, & Singh V (2013), “MAODV: Modified wormhole detection AODV protocol”, In IEEE 2013 Sixth International Conference on Contemporary Computing (IC3), pp. 239-243. https://doi.org/10.1109/IC3.2013.6612197.

      [23] Singh Y, Khatkar A, Rani P, & Barak DD (2013), “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, In IEEE 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT), pp. 283-287. https://doi.org/10.1109/ACCT.2013.68.

      [24] Poonia R, Sanghi AK, & Singh D (2011), “DSR routing protocol in wireless ad-hoc networks: Drop analysis”, International Journal of Computer Applications, 14(7), pp. 18-21. https://doi.org/10.5120/1896-2527.

      [25] Kushwaha DS, Singh VK, Singh S, & Sharma S (2014), “An efficient approach for detecting and avoiding wormhole attacks in wireless ad hoc networks”, International Journal of Advances in Electronics and Computer Science, 1(2), pp. 39-43.

      [26] Biswas J, Gupta A, & Singh D (2014), “WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocol”, In IEEE 2014 9th International Conference on Industrial and Information Systems (ICIIS), pp. 1-6. https://doi.org/10.1109/ICIINFS.2014.7036535.

      [27] Giannetsos T, & Dimitriou T (2014), “LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks”, Journal of Computer and System Sciences, 80(3), pp. 618-643. https://doi.org/10.1016/j.jcss.2013.06.015.


 

View

Download

Article ID: 21721
 
DOI: 10.14419/ijet.v7i4.21721




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.