Analysis and prevention of wormhole attack using trust and reputation management scheme in MANET

MANETs operates without fixed framework and all nodes in network perform like a router in sequence to forward information next receiver. Since the pivotal point rein lack, MANETs are additionally pregnable routing attacks as against various grids. Routing is one of the most serious attacks of wormhole attacks that are easier to be implemented nevertheless harder detection. Generally, it operates in two phases; in the first phase, wormhole channel nodes tend to draw more and more traffic route, and by other phase, they loss the grid by altering or dropping the grid traffic. In MANETs, numerous writers have implemented diverse results to prevent attacks. In this paper, we proposed a trust and reputation management scheme for find out the trusted location in MANET environment.

[1]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[2]  Neha Agrawal,et al.  RTT Based Wormhole Detection Using NS-3 , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[3]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[4]  King Sun Chan,et al.  RTT-TC: A topological comparison based method to detect wormhole attacks in MANET , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[5]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[6]  Seung-Woo Seo,et al.  WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks , 2006, ICUCT.

[7]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[8]  Soo Young Shin,et al.  Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).

[9]  Prashant Krishnamurthy,et al.  DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[10]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[11]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[12]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[13]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[14]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.

[15]  Preeti Nagrath,et al.  Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[16]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[17]  Varsha Singh,et al.  MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[18]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[19]  Mohsin Iftikhar,et al.  Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks , 2014, ADHOC-NOW Workshops.

[20]  Weijie Liu,et al.  Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.