Novel Technique for Detection of Wormhole Attack in MANET
DOI:
https://doi.org/10.26438/ijcse/v6i11.464468Keywords:
Wormhole, Delay per hop, Malicious, MANETsAbstract
The wireless nature of communication makes mobile ad hoc networks unreliable vulnerable to any attack with intent to steal the data can do so by deploying malicious nodes in the network. Normally the routing protocols are designed to find shortest path length is determined using hop count as metric. Out of many attacks the wormhole attack is pretty dangerous one as it is launched using two pairs of malicious nodes with create a tunnel by skipping few nodes in between source and destination node. The existing scheme considers the wormhole attacks when there are no intermediate nodes present between destinations. This technique is suitable for scenarios where the path length between source and destination is two hops only .this scheme cannot be used for networks with layer hops between source and destination node. In this research work, the novel scheme is proposed which detect and isolation malicious nodes from the MANETs. The malicious nodes are responsible to trigger wormhole attack in MANET. The proposed technique is implemented in NS2 and simulation results shows that proposed technique performs well as compared to other techniques
References
[1] M Moharlalpriya and I Krishnamurthi. “Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Comput. Electr. Eng., volume 40, issue 55, pp-530-538. 2014.
[2] VK Sagtani, and SKumar, “Modern Approach to Enhance Routing Recitation in MANET”. International Journal of Emerging Technology and Advanced Engineering, volume 4, issue 7, pp.265-270, 2014.
[3] Y. Hu, A Perrig and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on selected areas in communication, Vol. 24, No. 2, pp- 823-836, 2006.
[4] AC.Yao, "Protocol for Secure Computations," in proceedings of the 23rd annual IEEE symposium on foundation of computer science, volume 5, issue 14, pages 160-164, 1982.
[5] D. K. Mishra, M. Chandwani, "Extended Protocol for Secure Multiparty Computation using Ambiguous Identity," WSEAS Transaction on Computer Research, Vol. 2, issue 2, pp- 264-275, 2007.
[6] C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for Privacy-Preserving Distributed Data Mining," J. SIGKDD Explorations, Newsletter, VolA, No.2, ACM Press, pages 28-34, 2002.
[7] R. Sheikh, B. Kumar and D. K. Mishra, "PrivacyPreserving k-Secure Sum Protocol," in International Journal of Computer Science and Information Security, Vol.6 No.2, pages 184-188,, 2009.
[8] Sayan Majumder, Prof. Dr. Debika Bhattacharyya, “Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach”, 2018, IEEE
[9] Roshani Verma, PROF. Roopesh Sharma, Upendra Singh, “New Approach through Detection and Prevention of Wormhole Attack in MANET”, International Conference on Electronics, Communication and Aerospace Technology ICECA 2017
[10] Pratik Gite, “Link Stability Prediction for Mobile Ad-hoc Network Route Stability”, International Conference on Inventive Systems and Control, 2017
[11] Kavitha T, Muthaiah R, “ INSTANT ROUTE MIGRATION DURING LINK FAILURE IN MANETS”, International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 2017
[12] Sunil Kumar Jangir, Naveen Hemrajani, “A Comprehensive Review On Detection Of Wormhole Attack In MANET”, 2016, IEEE
[13] H.Ghayvat, S.Pandya, S.Shah, S.C.Mukhopadhyay, M.H.Yap, K.H.Wandra, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET”, 2016 Tenth International Conference on Sensing Technology
[14] Chitra Gupta, Priya Pathak, “Movement Based or Neighbor Based Tehnique For Preventing Wormhole Attack in MANET”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN)
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
