Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT

A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challenge. For the detection of wormhole attack various authors used various technique such as clock synchronization, threshold based technique, nearest neighbor node selection method. In this dissertation modified the IMAODV protocol in terms of IMAODV protocol.In this paper modified the AODV routing protocol for the detection of wormhole attack. The modified protocol is called secured energy efficient routing protocol (IMAODV). The IMAODV protocol based on two functions one is threshold based function and one is energy based function. The threshold based function measure the distance of normal node and wormhole node. Our proposed algorithm is

[1]  Srikanth V. Krishnamurthy,et al.  Power management for throughput enhancement in wireless ad-hoc networks , 2000, 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record.

[2]  Saurabh Upadhyay Avoiding Wormhole Attack in MANET using Statistical Analysis Approach , 2012 .

[4]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[5]  Bharat K. Bhargava,et al.  E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Deborah Estrin,et al.  Geography-informed energy conservation for Ad Hoc routing , 2001, MobiCom '01.

[7]  Issa M. Khalil,et al.  UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks , 2010, Ad Hoc Networks.

[8]  Charles E. Perkins,et al.  Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..

[9]  Bhupendra Verma,et al.  A Behavioral Study of Wormhole Attack in Routing for MANET , 2011 .

[10]  S. M. Heemstra de Groot,et al.  Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.

[11]  Vineet Srivastava,et al.  Wormhole Attack Detection in Mobile Ad Hoc Networks , 2012 .

[12]  Chunxiao Chigan,et al.  AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[13]  Prashant Srivastava,et al.  Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .

[14]  Mooi Choo Chuah,et al.  Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[15]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[16]  Harish Rohil,et al.  Securing MANET against Wormhole Attack using Neighbor Node Analysis , 2013 .

[17]  Qun Li,et al.  Online power-aware routing in wireless Ad-hoc networks , 2001, MobiCom '01.

[18]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[19]  Robert Tappan Morris,et al.  Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks , 2002, Wirel. Networks.

[20]  Daya Gupta,et al.  Effect of Black Hole Attack on MANET Routing Protocols , 2013 .

[21]  Radhika Ranjan Roy,et al.  Mobile Ad Hoc Networks , 2011 .

[22]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.

[23]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[24]  Krishna M. Sivalingam,et al.  Design and analysis of low‐power access protocols for wireless and mobile ATM networks , 2000, Wirel. Networks.

[25]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .