Detection and prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network

Wormhole attack is the dangerous attack which forms a serious threat in the networks, mostly for ad-hoc wireless routing protocols and wireless security system. In wormhole attack, an attacker node keeps data packets at one location in the network and forward to another attacker node far away by tunneling, which again broadcast them into the network locally. The proposed technique is an efficient detection and prevention method called Wormhole Attack Prevention and Detection Using Authentication Based Delay Per Hop Technique for Wireless Network. Detection of wormhole attack is done using number of hops and delay of each node in different paths available in network. The sender node is capable to identify both types of wormhole attacks. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator.

[1]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[2]  A. Khatkar,et al.  Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[3]  Varsha Singh,et al.  MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).

[4]  Gurmeet Kaur,et al.  Performance analysis of aodv for wormhole attack using different mobility models , 2014 .

[5]  Pallavi Khatri,et al.  Using identity and trust with key management for achieving security in Ad hoc Networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[6]  Uma Rathore Bhatt,et al.  MIKBIT- Modified DSR for MANET , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

[7]  Hitesh Gupta,et al.  A dynamic hybrid approach for wormhole detection and prevention , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[8]  S. Vanthana,et al.  Comparative Study of Proactive and Reactive AdHoc Routing Protocols Using Ns2 , 2014, 2014 World Congress on Computing and Communication Technologies.

[9]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[10]  Shailendra Singh,et al.  Improve Performance DSR Protocol by Application of Mobile Agent , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.

[11]  Tao Jiang,et al.  Intrusion detection of in-band wormholes in MANETs using advanced statistical methods , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[12]  Upena D. Dalal,et al.  Notice of Violation of IEEE Publication PrinciplesA Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks , 2010, 2010 3rd International Conference on Emerging Trends in Engineering and Technology.

[13]  Azzam Mourad,et al.  Detecting attacks in QoS-OLSR protocol , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).

[14]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[15]  K. V. Krishna Kishore,et al.  Performance estimation of DSR, DSDV and AODV in TCP, UDP and SCTP , 2014, 2014 International Conference on Reliability Optimization and Information Technology (ICROIT).

[16]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[17]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).