Call for Paper

CAE solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 31, 2023.

Read More

Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN

Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja. Published in Networks.

Communications on Applied Electronics
Year of Publication: 2015
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors: Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja
10.5120/cae2015651896

Mosmi Tiwari, Amrita Tiwari and Deepak Sukheja. Article: Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN. Communications on Applied Electronics 3(3):6-10, October 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

@article{key:article,
	author = {Mosmi Tiwari and Amrita Tiwari and Deepak Sukheja},
	title = {Article: Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN},
	journal = {Communications on Applied Electronics},
	year = {2015},
	volume = {3},
	number = {3},
	pages = {6-10},
	month = {October},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}
}

Abstract

Wormhole attack is one of severe security threat may apply on network layer. It is a passive attacks aims to drop packets by creating illusion of shortest path from source to destination. Wormhole nodes attempt to attract the genuine nods by showing an illusion of shortcut from source to destination and registered themselves as next hop at source routing table. When source consider wormhole tunnel as shortest route and transfer packet to wormhole node they start dropping packet respectively. This paper considers this problem as severe issue an attempt to derive a mechanism to detect and prevent wormhole node in mobile ad-hoc networks.

The objective of this paper is to study various ways to create wormhole attack and develop techniques to detect and prevent wormhole node using AODV routing protocol.

References

  1. Tarek Mosbah Abdala “Performance Tradeoffs of Routing Protocols in Wireless Sensor Networks” International Conference on Network security & Computer Science (ICNSCS-15) Feb. 8-9, 2015 Kuala Lumpur (Malaysia).
  2. Zainab Dalaf Katheeth “Performance Evaluation with Throughput andPacket Delivery Ratio for Mobile Ad-hoc Networks” International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014.
  3. R.Sherine Jenny “Simulation based performance comparison of aodv, dsr, fsr routing protocol with wormhole attack.” IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.3, No1, February 2013
  4. Kapil Raghuwanshi “An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET” International Journal of Computer Applications (0975 – 8887) Volume 110 – No. 7, January 2015.
  5. A.Vani and D. S. Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing in Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE) ISSN: 0975-3397 Vol. 3, No. 6, 2011.
  6. L. Hu and D. Evans “Using Directional Antennas to Prevent Wormhole Attacks” , In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
  7. D. B. Roy, R.Chaki and N. Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks” International Journal of Network Security & Its Applications (IJNSA), Vol. 1, No.1, 2009.
  8. D. S. Kushwaha, A. Khare and J. L .Rana, “Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET”, in International Journal of Computer Applications, Vol. 62, No.7, 2013.
  9. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad-hoc Routing for Wireless Networks”, Report No.UIUCDCS-R-2002-2290, UIUC, 2002
  10. H. Deng, W. Li, and D. P. Agrawal, “Routing Security in Wireless Ad Hoc Networks”, Telecommunications Network Security, IEEE Communications Magazine, Vol. 40, No. 10, pp 70-75, 2002.
  11. Z. Alishahi, J. Mirabedini and M. K. Rafsanjani, “A new method for improving security in MANETs AODV Protocol”, Management Science Letters 2 (2012) 2271–2280.
  12. K. S. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  13. Maurice Chu International Journal of High Performance Computing Applications, Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks
  14. S.M. Jen, C.S. Laih, and W.C. Kuo, “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET”, Sensors 2009.
  15. K. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  16. L. Qian, N. Song and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path”
  17. Xu Su Rajendra V. Boppana, “On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks”, in proceedings of IEEE Communications Society, ICC 2007.
  18. R. Maheshwari, J. Gao and S. R Das, “Detecting Wormhole Attacks in Wireless Networks using Connectivity Information”,
  19. V. Kumar and A. Kush, “Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol”, International Journal of Computer Applications, Vol. 44, No.4, 2012.
  20. K. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  21. X. Wang and J. Wong, “An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks”

Keywords

WSN, Worm-Hole, AODV