Wormhole Attack Detection Technique in Mobile Ad Hoc Networks

被引:12
|
作者
Kaur, Parvinder [1 ]
Kaur, Dalveer [2 ]
Mahajan, Rajiv [3 ]
机构
[1] Punjab Tech Univ, Dept Res Innovat & Consultancy, Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[2] Punjab Tech Univ, PIT Univ Campus,Jalandhar Kapurthala Highway, Jalandhar, Punjab, India
[3] Golden Coll Engn & Technol, Dept Comp Sci & Engn, Gurdaspur, Punjab, India
关键词
Mobile ad hoc networks (Manets); AODV; Wormhole attack; Metrics; Network simulator; Friis equation; DelPHI;
D O I
10.1007/s11277-017-4643-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A wormhole attack is harmful attack against routing protocols in ad hoc network where node attracts packets from one location and retransmits them to other location using long range link within the network. A wormhole attack can be easily launched between two attacker nodes without compromising the mobile nodes. Most of routing protocols don't have any defending technique against wormhole activities; so in the presence of attacker nodes malicious activities may occur and disrupt network communication by tamper the data or forward the message to unknown location of the network to disrupt it functionality. Several routing protocols have been proposed to defend against wormhole attack in mobile ad hoc networks by adapting synchronization clocks, GPS or any special hardware. In this research article, we proposed a novel wormhole detection technique which identifies the wormhole link by calculating the maximum end to end delay between two nodes within the communication range. Mobile nodes do not need to be equipped with GPS, clock synchronized or any other type of special hardware. The simulation results prove that proposed scheme detects wormhole attack.
引用
收藏
页码:2939 / 2950
页数:12
相关论文
共 50 条
  • [41] A Novel Intrusion Detection System for Ad Hoc Flooding Attack Using Fuzzy Logic in Mobile Ad Hoc Networks
    Chaudhary, Alka
    Tiwari, Vivekananda
    Kumar, Anil
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [42] Wormhole attack detection techniques in ad-hoc network: A systematic review
    Gupta, Chitvan
    Singh, Laxman
    Tiwari, Rajdev
    [J]. OPEN COMPUTER SCIENCE, 2022, 12 (01): : 260 - 288
  • [43] FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks
    Sunil Kumar
    Kamlesh Dutta
    Anjani Garg
    [J]. Wireless Personal Communications, 2018, 101 : 1901 - 1927
  • [44] FJADA: Friendship Based JellyFish Attack Detection Algorithm for Mobile Ad Hoc Networks
    Kumar, Sunil
    Dutta, Kamlesh
    Garg, Anjani
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 101 (04) : 1901 - 1927
  • [45] Novel gray hole attack detection scheme for mobile ad-hoc networks
    Chen, Wei
    Long, Xiang
    Gao, Xiaopeng
    Bai, Yuebin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (08): : 1371 - 1377
  • [46] Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey
    Liu, Gao
    Yan, Zheng
    Pedrycz, Witold
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 105 : 105 - 122
  • [47] On the Performance of TDD and LDD Based Clone Attack Detection in Mobile Ad Hoc Networks
    Wang, Dapeng
    Li, Pei
    Hu, Pengfei
    Xing, Kai
    Wang, Yang
    Huang, Liusheng
    Rong, Yanxia
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 532 - 539
  • [48] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Khan, Muhammad Sajid
    Iltaf, Naima
    Rashdi, Adnan
    [J]. 2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
  • [49] A Novel Gray Hole attack detection scheme for Mobile Ad-Hoc Networks
    Gao Xiaopeng
    Chen Wei
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 209 - 214
  • [50] Black Hole Attack Detection and Prevention Mechanism for Mobile Ad-Hoc Networks
    Dhama, Siddharth
    Sharma, Sandeep
    Saini, Mukul
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2993 - 2996