Wormhole Attack Detection Technique in Mobile Ad Hoc Networks

被引:12
|
作者
Kaur, Parvinder [1 ]
Kaur, Dalveer [2 ]
Mahajan, Rajiv [3 ]
机构
[1] Punjab Tech Univ, Dept Res Innovat & Consultancy, Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[2] Punjab Tech Univ, PIT Univ Campus,Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[3] Golden Coll Engn & Technol, Dept Comp Sci & Engn, Gurdaspur, Punjab, India
关键词
Mobile ad hoc networks (Manets); AODV; Wormhole attack; Metrics; Network simulator; Friis equation; DelPHI;
D O I
10.1007/s11277-017-4643-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A wormhole attack is harmful attack against routing protocols in ad hoc network where node attracts packets from one location and retransmits them to other location using long range link within the network. A wormhole attack can be easily launched between two attacker nodes without compromising the mobile nodes. Most of routing protocols don't have any defending technique against wormhole activities; so in the presence of attacker nodes malicious activities may occur and disrupt network communication by tamper the data or forward the message to unknown location of the network to disrupt it functionality. Several routing protocols have been proposed to defend against wormhole attack in mobile ad hoc networks by adapting synchronization clocks, GPS or any special hardware. In this research article, we proposed a novel wormhole detection technique which identifies the wormhole link by calculating the maximum end to end delay between two nodes within the communication range. Mobile nodes do not need to be equipped with GPS, clock synchronized or any other type of special hardware. The simulation results prove that proposed scheme detects wormhole attack.
引用
收藏
页码:2939 / 2950
页数:12
相关论文
共 50 条
  • [1] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Parvinder Kaur
    Dalveer Kaur
    Rajiv Mahajan
    [J]. Wireless Personal Communications, 2017, 97 : 2939 - 2950
  • [2] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    [J]. 2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [3] Graph-Based Wormhole Attack Detection in Mobile Ad hoc Networks (MANETs)
    Rmayti, M.
    Begriche, Y.
    Khatoun, R.
    Khoukhi, L.
    Mammeri, A.
    [J]. PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [4] Selfish Attack Detection in Mobile Ad hoc Networks
    Ghonge, Mangesh M.
    Jawandhiya, P. M.
    Thakare, V. M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2017,
  • [5] Study of Various Wormhole Attack Detection Techniques in Mobile Ad hoc Network
    Mudgal, Richa
    Gupta, Rohit
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3748 - 3754
  • [6] A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
    Tahboush, Muhannad
    Agoyi, Mary
    [J]. IEEE ACCESS, 2021, 9 : 11872 - 11883
  • [7] Wormhole attack detection in ad hoc network using machine learning technique
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [8] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [9] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260
  • [10] An end-to-end detection of wormhole attack in wireless ad-hoc networks
    Wang, Xia
    Wong, Johnny
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 39 - +