Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET

Wireless Communication is an inevitable part of Smart Home domain. A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET suffers from both kinds of attacks, active and passive attacks at all the layers of the network model. The lacks of security measures of routing protocols allow attackers to intrude the network. Wormhole, the attack is generated by tunnels creation and it results in complete disruption of routing paths on MANET. The proposed security approach is to detect and mitigate wormhole attack. It is secured Ad hoc on demand distance vector (AODV) approach which efficiently finds wormhole attack present in a MANET and Digital signature is used to prevent it. This approach is based on a calculation of tunneling time taken by tunnel to analyze the behavior of wormhole. Afterward, it decides some static threshold value. Based upon this tunneling time and threshold value, it decides whether given node is wormhole node or trustworthy node. A digital signature and hash chain algorithm is applied to mitigate the wormhole node.

[1]  Farrukh Aslam Khan,et al.  Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.

[2]  Anal Patel,et al.  Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[3]  D. Arivazhagan,et al.  Applications, Advantages and Challenges of Ad Hoc Networks , 2014 .

[4]  P VandanaC.,et al.  WAD-HLA: Wormhole Attack Detection Using Hop Latency And Adjoining Node Analysis In MANET , 2013 .

[5]  Yogadhar Pandey,et al.  Detection and Prevention of Wormhole Attacks in MANETs using Detection Packet , 2013 .

[6]  J. L. Rana,et al.  Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET , 2013 .

[7]  Neha Agrawal,et al.  RTT Based Wormhole Detection Using NS-3 , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[8]  Harish Rohil,et al.  Securing MANET against Wormhole Attack using Neighbor Node Analysis , 2013 .

[9]  Vishal Sharma,et al.  A Novel Approach for Wormhole Detection in MANET , 2013 .

[10]  Sumitra Menaria,et al.  A Review On: Detection and Prevention of Wormhole Attacks in MANET , 2013 .

[11]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[12]  A. Khatkar,et al.  Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[13]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[14]  P. S. Joshi,et al.  Wireless Speed Control Of An Induction Motor Using PWM Technique With GSM , 2013 .

[15]  Sudhir Agrawal,et al.  Analysis of Black-Hole Attack in MANET using AODV Routing Protocol , 2014 .