Open Access   Article Go Back

A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV

N. Tamilarasi1 , S.G. Santhi2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 730-734, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.730734

Online published on Dec 31, 2018

Copyright © N. Tamilarasi, S.G. Santhi . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: N. Tamilarasi, S.G. Santhi, “A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.730-734, 2018.

MLA Style Citation: N. Tamilarasi, S.G. Santhi "A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV." International Journal of Computer Sciences and Engineering 6.12 (2018): 730-734.

APA Style Citation: N. Tamilarasi, S.G. Santhi, (2018). A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV. International Journal of Computer Sciences and Engineering, 6(12), 730-734.

BibTex Style Citation:
@article{Tamilarasi_2018,
author = {N. Tamilarasi, S.G. Santhi},
title = {A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {730-734},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3405},
doi = {https://doi.org/10.26438/ijcse/v6i12.730734}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.730734}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3405
TI - A New Approach to Detect and Prevent Wormhole in Wireless Sensor Network Using AD-AODV
T2 - International Journal of Computer Sciences and Engineering
AU - N. Tamilarasi, S.G. Santhi
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 730-734
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
366 230 downloads 202 downloads
  
  
           

Abstract

Now-a-days wireless networks are needed for mobile communication that makes wired communication impossible. The characteristics of WSN are small battery, restricted bandwidth and dynamic topology that expose Wireless Sensor Networks (WSN) to various kinds of attacks such as Black hole, Wormhole, Selective forwarding, Sink hole etc., . Therefore proper security measures will be taken while implementing WSN. Among all those attacks, wormhole attack is the most powerful attack in sensor networks. In this paper, a novelty routing protocol called attack detection ad hoc on demand distance vector (AD-AODV) is proposed to detect and prevent wormhole attack in wireless sensor network. This protocol needs no special hardware and software for the implementation. Moreover it is based on round trip time (RT), threshold round trip time (TRT) and the hop count for detecting the wormhole node. Network simulator2 (NS2) is used for implementing the proposed work.

Key-Words / Index Term

Wireless sensor Network ,Round trip time, Threshold Round trip time, Hop count and AD-AODV

References

[1] Zubair Ahmed Khan, M. Hasan Islam” Wormhole Attack: A new detection technique”978-1-4673-4451- 7/12/$31.00 ©2012 IEEE.
[2] Perkins, C., Belding-Royer, E., & Das, S. (2002). “Adhoc on-demand distance vector (AODV) Routing”,IETF RFC 3561, July 2002.
[3] Kanika Garg, RishiPal Singh, “Scheduling Algorithms in Mobile Ad Hoc Networks”, July 2012
[4] R. Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini. Distributed "Detection of wormhole attacks in wireless sensor networks," Springer book chapter Ad Hoc Networks, vol. 28, pp. 208í22, 2010. [34] A.Vani,
[5] D.Sreenivasa Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE), 2011, Vol. 3 No. 6, pp. 2377-2384, June 2011.
[6] H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
[7] S.Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.
[8] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.
[9] Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks,” In Proc. of INFOCOM, 2003.[9] Yith-Chun Hu” Wormhole attacks in wireless networks”IEEE Journal on Selected areas in Communication,IEEE Press Piscataway,NJ,USA ISSN:0733-8716 doi>10.1109/JSAC.2005.861394 Volume2,Issue 24,pages 370-380,
[10] Majid Khabbazian” Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure” V6T 1Z4
[11] Rupinder Singh, Jatinder Singh, and Ravinder Singh” WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks” Revised 23 October 2016; Accepted 2 November 2016
[12]Yurong Xu,Guanling Chen,James Ford,Fillia Makedon,” Detecting Wormhole Attacks in Wireless Sensor Networks“Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 253)
[13] Gu-Hsin” Detection of wormhole attacks on IPv6 mobility-based wireless sensor network”, EURASIP Journal on Wireless Communications and Networking20162016:274 https://doi.org/10.1186/s13638-016-0776-0
[14] C. Nita-Rotaru, and H. Rubens, “An ondemand secure routing protocol resilient to byzantine failures,” In ACM Workshop on Wireless Security (WiSe), 2002.
[15] B. Dahill, B. N. Levine, E. Royer, and C. Shields,, “A secure routing protocol for ad hoc networks,” In Proc.of the 10th Conference on Network Protocols (ICNP), 2002.
[16] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, “Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach,” In Proc. of WCNC, 2005. [5] B. Awerbuch, D. Holmer.

[17] Haseed Zafar, David Harle, “QoS-aware Multipath Routing scheme for Mobile Ad Hoc Networks”, April 2012.
[18] S. Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure tracking of node encounters in multi-hop wireless networks,” In Proc. of the first ACM workshop on Security of ad hoc and sensor networks, 2003.
[19] M. Zapata and N. Asokan, “Securing ad hoc routing protocols,” ACM WiSe, 2002.
[20] W. Weichao, B. Bharat, Y. Lu, and X. Wu. "Defending against wormhole attacks in mobile ad-hoc networks," Wireless Communication and Mobile Computing, vol. 6, no. 4, pp 483í503, 2006.
[21] I. Khalil, S. Bagchi, and N.B. Shroff. "MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks," Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344í62, 2008.
[22] R. Venkataraman, M. Pushpalatha, T.R. Rao, and R. Khemka. "A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks," International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.
[23] Jhaveri, R.H.; Patel, S.J.; Jinwala, D.C.; , "DoS Attacks in Mobile Ad Hoc Networks: A Survey," Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on , vol., no., pp.535-541, 7-8 Jan. 2012.