Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol
International Journal of Electronics and Communication Engineering |
© 2014 by SSRG - IJECE Journal |
Volume 1 Issue 10 |
Year of Publication : 2014 |
Authors : Ms Neha Choudhary and Dr Sudhir Agrawal |
How to Cite?
Ms Neha Choudhary and Dr Sudhir Agrawal, "Analysis of Worm-Hole Attack in MANET using AODV Routing Protocol," SSRG International Journal of Electronics and Communication Engineering, vol. 1, no. 10, pp. 1-6, 2014. Crossref, https://doi.org/10.14445/23488549/IJECE-V1I10P101
Abstract:
MANET is an infrastructure less, dynamic, decentralized network. Any node can join the network and leave the network at any point of time. Due to dynamic infrastructure-less nature and lack of centralized monitoring points, the ad hoc networks are vulnerable to attacks. The network performance and reliability is break by attacks on ad hoc network routing protocols. AODV is a important ondemand reactive routing protocol for mobile ad hoc networks. There is no any security provision against a “Wormhole” attacks in existing AODV protocol The wormhole attack is also one of the severe attacks of MANET. The wormhole attack is basically launched by a pair of collaborating nodes. In wormhole attack two collaborating attacker nodes occupy strong strategic locations in two different parts of the network and advertise to have the shortest path for transmitting data and make wormhole tunnel.. This paper discusses some of the techniques put forwarded by researchers to detect and prevent worm hole attack in MANET using AODV protocol
Keywords:
MANET, AODV, adhoc, worm hole attack, Malicious Node.
References:
[1] C. K. Toh, “Ad Hoc Wireless Networks”
[2] Z. Danailov, “Attacks on Mobile Ad hoc Netwoks”, Seminar Report, Integrated Information Systems, Ruhr University, Bochum, Germany, 2012.
[3] M. Meghdadi, S. Ozdemir and I. Guler, “A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks”, IETE Technical Review, Vol.28, Issue 2, pp 89-102, 2011.
[4] B. Wu, J. Chen, J. Wu and M. Cardei, “A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless/Mobile Network Security, Springer, 2006.
[5] Xu Su Rajendra V. Boppana, “On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks”, in proceedings of IEEE Communications Society, ICC 2007.
[6] A.VANI and D. S. Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing in Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE) ISSN : 0975-3397 Vol. 3, No. 6, 2011.
[7] R. Maheshwari, J. Gao and S. R Das, “Detecting Wormhole Attacks in Wireless Networks using Connectivity Information”,
[8] L. Hu and D. Evans “Using Directional Antennas to Prevent Wormhole Attacks” , In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
[9] V. Kumar and A. Kush, “Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol”, International Journal of Computer Applications, Vol. 44, No.4, 2012.
[10] K. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
[11] Y. Xu, G. Chen, J. Ford and F. Makedon, “Detecting Wormhole Attacks in Wireless Sensor Networks”
[12] W. Ahad and M. Sharma, “Efficient Multipath Algorithm in MANETs to Prevent Wormhole Attack”, CT International Journal of Information & Communication Technology, Vol. 1, Issue 1, pp 5-8, 2013.
[13] P. V. Tran, L. X. Hung, Y. K. Lee, S. Lee and H. Lee, “TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks”, IEEE, pp 593-598, 2007.
[14] T. V. Phuong, N. T. Canh, Y.K. Lee, S. Lee, and H. Lee, “Transmission Time-based Mechanism to Detect Wormhole Attacks”, IEEE Asia-Pacific Services Computing Conference, IEEE Computer Society, pp 172-178, 2007.
[15] X. Wang and J. Wong, “An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks”
[16] P. Sharma and A. Trivedi, “Prevention of Wormhole Attack in Ad-Hoc Network”, Special Issue of International Journal of Computer Applications (0975 – 8887) on Electronics, Information and Communication Engineering - ICEICE No.5, 2011.