A lightweight technique for detection and prevention of wormhole attack in MANET

A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managing mobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks. The malicious node exploits these vulnerabilities to lunch attacks, especially when nodes have mobility and network do not have constant topology, like wormhole attack. This paper presents a lightweight technique that detects the wormhole attacks in MANET. In the proposed technique, the source node calculates the average sequence number of the reply (RREP) packets. If the sequence number of the corresponding node exceeds the calculated average value of the sequence number, then all traffic is discarded, and the node is marked as malicious. The proposed technique is less complex, power-efficient, and enhances network lifetime as more data packets are delivered to the destination node. This technique is validated through comprehensive simulations results in NS2

[1]  Shabina Parbin,et al.  Analysis and prevention of wormhole attack using trust and reputation management scheme in MANET , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[2]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[3]  Josia Antony,et al.  A Survey on computation of neighbouring nodes and malicious nodes in all direction with single directional antenna , 2018, 2018 International Conference on Control, Power, Communication and Computing Technologies (ICCPCCT).

[4]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[5]  Mohammed Feham,et al.  Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).

[6]  Mariano García Otero,et al.  Detection of wormhole attacks in wireless sensor networks using range-free localization , 2012, 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD).

[7]  Magdy S. El-Soudani,et al.  A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.

[8]  Asif Ali Laghari,et al.  A Step towards the Efficiency of Collisions in the Wireless Sensor Networks , 2019, EAI Endorsed Trans. Scalable Inf. Syst..

[9]  Saurabh Bilgaiyan,et al.  Curbing Distributed Denial of Service attack by traffic filtering in Wireless Sensor Network , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[10]  S. C. Mukhopadhyay,et al.  Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET , 2016, 2016 10th International Conference on Sensing Technology (ICST).

[11]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[12]  Kamlesh Dutta,et al.  Detecting Wormhole Attack on Data Aggregation in Hierarchical WSN , 2017, Int. J. Inf. Secur. Priv..

[13]  Debika Bhattacharyya,et al.  Mitigating wormhole attack in MANET using absolute deviation statistical approach , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[14]  Priya Pathak,et al.  Movement based or neighbor based tehnique for preventing wormhole attack in MANET , 2016, 2016 Symposium on Colossal Data Analysis and Networking (CDAN).

[15]  Daniel T. Fokum,et al.  Securing wireless sensor networks from denial-of-service attacks using artificial intelligence and the CLIPS expert system tool , 2013, 2013 Proceedings of IEEE Southeastcon.

[16]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[17]  Hua Wang,et al.  From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence , 2020, IEEE Access.

[18]  Amrita Parashar,et al.  Trust computation using D-S in sector based area to detect or preventing worm hole in MANET , 2016, 2016 International Conference on Inventive Computation Technologies (ICICT).

[19]  Muhammad Imran,et al.  A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..

[20]  Rakesh Kumar,et al.  Reviewing the impact of wormhole attack in MANET , 2016, 2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH).

[21]  Dalveer Kaur,et al.  Wormhole Attack Detection Technique in Mobile Ad Hoc Networks , 2017, Wirel. Pers. Commun..

[22]  Hua Wang,et al.  Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks , 2019, IEEE Access.

[23]  Ritu Chadha,et al.  Attack-Resistant Routing : a Framework for Enhancing Routing Robustness in Wireless Ad-hoc Networks , 2020, NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium.

[24]  Varsha Singh,et al.  MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[25]  Uma Rathore Bhatt,et al.  DDOS Attack Aware DSR Routing Protocol in WSN , 2016 .

[26]  Meenakshi Mittal,et al.  Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data , 2020 .

[27]  Upendra Singh,et al.  New approach through detection and prevention of wormhole attack in MANET , 2017, 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA).

[28]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[29]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[30]  Vishnu Sharma,et al.  Survey on security issues in MANET: Wormhole detection and prevention , 2016, 2016 International Conference on Computing, Communication and Automation (ICCCA).