Open Access   Article Go Back

Novel Technique for Detection of Wormhole Attack in MANET

Sukhwinder Singh1 , Rajnish Kansal2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 464-468, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.464468

Online published on Nov 30, 2018

Copyright © Sukhwinder Singh, Rajnish Kansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sukhwinder Singh, Rajnish Kansal, “Novel Technique for Detection of Wormhole Attack in MANET,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.464-468, 2018.

MLA Style Citation: Sukhwinder Singh, Rajnish Kansal "Novel Technique for Detection of Wormhole Attack in MANET." International Journal of Computer Sciences and Engineering 6.11 (2018): 464-468.

APA Style Citation: Sukhwinder Singh, Rajnish Kansal, (2018). Novel Technique for Detection of Wormhole Attack in MANET. International Journal of Computer Sciences and Engineering, 6(11), 464-468.

BibTex Style Citation:
@article{Singh_2018,
author = {Sukhwinder Singh, Rajnish Kansal},
title = {Novel Technique for Detection of Wormhole Attack in MANET},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {464-468},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3189},
doi = {https://doi.org/10.26438/ijcse/v6i11.464468}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.464468}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3189
TI - Novel Technique for Detection of Wormhole Attack in MANET
T2 - International Journal of Computer Sciences and Engineering
AU - Sukhwinder Singh, Rajnish Kansal
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 464-468
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
360 328 downloads 117 downloads
  
  
           

Abstract

The wireless nature of communication makes mobile ad hoc networks unreliable vulnerable to any attack with intent to steal the data can do so by deploying malicious nodes in the network. Normally the routing protocols are designed to find shortest path length is determined using hop count as metric. Out of many attacks the wormhole attack is pretty dangerous one as it is launched using two pairs of malicious nodes with create a tunnel by skipping few nodes in between source and destination node. The existing scheme considers the wormhole attacks when there are no intermediate nodes present between destinations. This technique is suitable for scenarios where the path length between source and destination is two hops only .this scheme cannot be used for networks with layer hops between source and destination node. In this research work, the novel scheme is proposed which detect and isolation malicious nodes from the MANETs. The malicious nodes are responsible to trigger wormhole attack in MANET. The proposed technique is implemented in NS2 and simulation results shows that proposed technique performs well as compared to other techniques.

Key-Words / Index Term

Wormhole, Delay per hop, Malicious, MANETs

References

[1]. M Moharlalpriya and I Krishnamurthi. “Modified DSR protocol for detection and removal of selective black hole attack in MANET”, Comput. Electr. Eng., volume 40, issue 55, pp-530-538. 2014.
[2]. VK Sagtani, and SKumar, “Modern Approach to Enhance Routing Recitation in MANET”. International Journal of Emerging Technology and Advanced Engineering, volume 4, issue 7, pp.265-270, 2014.
[3]. Y. Hu, A Perrig and D. Johnson, “Wormhole Attacks in Wireless Networks”, IEEE Journal on selected areas in communication, Vol. 24, No. 2, pp- 823-836, 2006.
[4]. AC.Yao, "Protocol for Secure Computations," in proceedings of the 23rd annual IEEE symposium on foundation of computer science, volume 5, issue 14, pages 160-164, 1982.
[5]. D. K. Mishra, M. Chandwani, "Extended Protocol for Secure Multiparty Computation using Ambiguous Identity," WSEAS Transaction on Computer Research, Vol. 2, issue 2, pp- 264-275, 2007.
[6]. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for Privacy-Preserving Distributed Data Mining," J. SIGKDD Explorations, Newsletter, VolA, No.2, ACM Press, pages 28-34, 2002.
[7]. R. Sheikh, B. Kumar and D. K. Mishra, "PrivacyPreserving k-Secure Sum Protocol," in International Journal of Computer Science and Information Security, Vol.6 No.2, pages 184-188,, 2009.
[8]. Sayan Majumder, Prof. Dr. Debika Bhattacharyya, “Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach”, 2018, IEEE
[9]. Roshani Verma, PROF. Roopesh Sharma, Upendra Singh, “New Approach through Detection and Prevention of Wormhole Attack in MANET”, International Conference on Electronics, Communication and Aerospace Technology ICECA 2017
[10]. Pratik Gite, “Link Stability Prediction for Mobile Ad-hoc Network Route Stability”, International Conference on Inventive Systems and Control, 2017
[11]. Kavitha T, Muthaiah R, “ INSTANT ROUTE MIGRATION DURING LINK FAILURE IN MANETS”, International Journal of Mechanical Engineering and Technology (IJMET) Volume 8, Issue 8, August 2017
[12]. Sunil Kumar Jangir, Naveen Hemrajani, “A Comprehensive Review On Detection Of Wormhole Attack In MANET”, 2016, IEEE
[13]. H.Ghayvat, S.Pandya, S.Shah, S.C.Mukhopadhyay, M.H.Yap, K.H.Wandra, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET”, 2016 Tenth International Conference on Sensing Technology
[14]. Chitra Gupta, Priya Pathak, “Movement Based or Neighbor Based Tehnique For Preventing Wormhole Attack in MANET”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN)