A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV

Authors

  • Tamilarasi N Dept. of Computer and Information Sciences, Annamalai University, Annamalainagar, India
  • Santhi SG Dept. of Computer Science and Engineering, Annamalai University, Annamalainagar, India

DOI:

https://doi.org/10.26438/ijcse/v6i12.730734

Keywords:

Wireless sensor Network, Round trip time, Threshold Round trip time, Hop count and AD-AODV

Abstract

Now-a-days wireless networks are needed for mobile communication that makes wired communication impossible. The characteristics of WSN are small battery, restricted bandwidth and dynamic topology that expose Wireless Sensor Networks (WSN) to various kinds of attacks such as Black hole, Wormhole, Selective forwarding, Sink hole etc., . Therefore proper security measures will be taken while implementing WSN. Among all those attacks, wormhole attack is the most powerful attack in sensor networks. In this paper, a novelty routing protocol called attack detection ad hoc on demand distance vector (AD-AODV) is proposed to detect and prevent wormhole attack in wireless sensor network. This protocol needs no special hardware and software for the implementation. Moreover it is based on round trip time (RT), threshold round trip time (TRT) and the hop count for detecting the wormhole node. Network simulator2 (NS2) is used for implementing the proposed work.

References

[1] Zubair Ahmed Khan, M. Hasan Islam” Wormhole Attack: A new detection technique”978-1-4673-4451- 7/12/$31.00 ©2012 IEEE.

[2] Perkins, C., Belding-Royer, E., & Das, S. (2002). “Adhoc on-demand distance vector (AODV) Routing”,IETF RFC 3561, July 2002.

[3] Kanika Garg, RishiPal Singh, “Scheduling Algorithms in Mobile Ad Hoc Networks”, July 2012

[4] R. Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini. Distributed "Detection of wormhole attacks in wireless sensor networks," Springer book chapter Ad Hoc Networks, vol. 28, pp. 208í22, 2010. [34] A.Vani,

[5] D.Sreenivasa Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3 No. 6, pp. 2377-2384, June 2011.

[6] H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.

[7] S.Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.

[8] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.

[9] Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” In Proc. of INFOCOM, 2003.[9] Yith-Chun Hu” Wormhole attacks in wireless networks”IEEE Journal on Selected areas in Communication,IEEE Press Piscataway,NJ,USA ISSN:0733-8716 doi>10.1109/JSAC.2005.861394 Volume2,Issue 24,pages 370-380,

[10] Majid Khabbazian” Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure” V6T 1Z4

[11] Rupinder Singh, Jatinder Singh, and Ravinder Singh” WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks” Revised 23 October 2016; Accepted 2 November 2016

[12]Yurong Xu,Guanling Chen,James Ford,Fillia Makedon,” Detecting Wormhole Attacks in Wireless Sensor Networks“Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)

[13] Gu-Hsin” Detection of wormhole attacks on IPv6 mobility-based wireless sensor network”, EURASIP Journal on Wireless Communications and Networking20162016:274 https://doi.org/10.1186/s13638-016-0776-0

[14] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.

[15] B. Dahill, B. N. Levine, E. Royer, and C. Shields,, “A secure routing protocol for ad hoc networks,” In Proc.of the 10th Conference on Network Protocols (ICNP), 2002.

[16] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,” In Proc. of WCNC, 2005. [5] B. Awerbuch, D. Holmer.

[17] Haseed Zafar, David Harle, “QoS-aware Multipath Routing scheme for Mobile Ad Hoc Networks”, April 2012.

[18] S. Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.

[19] M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” ACM WiSe, 2002.

[20] W. Weichao, B. Bharat, Y. Lu, and X. Wu. "Defending against wormhole attacks in mobile ad-hoc networks," Wireless Communication and Mobile Computing, vol. 6, no. 4, pp 483í503, 2006.

[21] I. Khalil, S. Bagchi, and N.B. Shroff. "MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks," Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344í62, 2008.

[22] R. Venkataraman, M. Pushpalatha, T.R. Rao, and R. Khemka. "A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks," International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.

[23] Jhaveri, R.H.; Patel, S.J.; Jinwala, D.C.; , "DoS Attacks in Mobile Ad Hoc Networks: A Survey," Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on , vol., no., pp.535-541, 7-8 Jan. 2012.

Downloads

Published

2018-12-31
CITATION
DOI: 10.26438/ijcse/v6i12.730734
Published: 2018-12-31

How to Cite

[1]
N. Tamilarasi and S. Santhi, “A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV”, Int. J. Comp. Sci. Eng., vol. 6, no. 12, pp. 730–734, Dec. 2018.

Issue

Section

Research Article