Wormhole Attack Detection Technique in Mobile Ad Hoc Networks

被引:12
|
作者
Kaur, Parvinder [1 ]
Kaur, Dalveer [2 ]
Mahajan, Rajiv [3 ]
机构
[1] Punjab Tech Univ, Dept Res Innovat & Consultancy, Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[2] Punjab Tech Univ, PIT Univ Campus,Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[3] Golden Coll Engn & Technol, Dept Comp Sci & Engn, Gurdaspur, Punjab, India
关键词
Mobile ad hoc networks (Manets); AODV; Wormhole attack; Metrics; Network simulator; Friis equation; DelPHI;
D O I
10.1007/s11277-017-4643-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A wormhole attack is harmful attack against routing protocols in ad hoc network where node attracts packets from one location and retransmits them to other location using long range link within the network. A wormhole attack can be easily launched between two attacker nodes without compromising the mobile nodes. Most of routing protocols don't have any defending technique against wormhole activities; so in the presence of attacker nodes malicious activities may occur and disrupt network communication by tamper the data or forward the message to unknown location of the network to disrupt it functionality. Several routing protocols have been proposed to defend against wormhole attack in mobile ad hoc networks by adapting synchronization clocks, GPS or any special hardware. In this research article, we proposed a novel wormhole detection technique which identifies the wormhole link by calculating the maximum end to end delay between two nodes within the communication range. Mobile nodes do not need to be equipped with GPS, clock synchronized or any other type of special hardware. The simulation results prove that proposed scheme detects wormhole attack.
引用
收藏
页码:2939 / 2950
页数:12
相关论文
共 50 条
  • [21] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [22] Wormhole Attack Avoidance Technique in Mobile Adhoc Networks
    Singh, Yudhvir
    Khatkar, Avni
    Rani, Prabha
    Deepika
    Barak, Dheer Dhwaj
    [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES (ACCT 2013), 2013, : 283 - 287
  • [23] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
    Geetha, K.
    Sreenath, N.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 1161 - 1172
  • [24] Detection and Isolation of Black Hole attack in Mobile Ad Hoc Networks - A Review
    Nagasubramanian, Gayathri
    Sakthivel, Rakesh Kumar
    Patan, Rizwan
    Ehtemami, Anahid
    Meyer-Baese, Anke
    Tahmassebi, Amirhessam
    Gandomi, Amir H.
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES IV, 2020, 11419
  • [25] Clone attack detection and data loss prevention in mobile ad hoc networks
    Mani, Ganapathy
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2015, 5 (01) : 9 - 22
  • [26] A distributed protocol for detection of packet dropping attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Balamuralidhar, P.
    Harihara, S. G.
    Reddy, Harish
    [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 75 - 80
  • [27] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
    K. Geetha
    N. Sreenath
    [J]. Arabian Journal for Science and Engineering, 2016, 41 : 1161 - 1172
  • [28] WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks
    Su, Ming-Yang
    [J]. COMPUTERS & SECURITY, 2010, 29 (02) : 208 - 224
  • [29] Trace flooding attack in mobile ad hoc networks
    Guo, Yinghua
    Perreau, Sylvie
    [J]. PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 329 - 334
  • [30] PERFORMANCE OF MOBILE AD HOC NETWORKS UNDER ATTACK
    Harb, Lamyaa M. T.
    Tantawy, M.
    Elsoudani, M.
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,