Open Access   Article Go Back

Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network

Syed Muqtar Ahmed1 , Syed Abdul Sattar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 652-657, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.652657

Online published on May 31, 2019

Copyright © Syed Muqtar Ahmed, Syed Abdul Sattar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar, “Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.652-657, 2019.

MLA Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar "Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network." International Journal of Computer Sciences and Engineering 7.5 (2019): 652-657.

APA Style Citation: Syed Muqtar Ahmed, Syed Abdul Sattar, (2019). Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network. International Journal of Computer Sciences and Engineering, 7(5), 652-657.

BibTex Style Citation:
@article{Ahmed_2019,
author = {Syed Muqtar Ahmed, Syed Abdul Sattar},
title = {Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {652-657},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4295},
doi = {https://doi.org/10.26438/ijcse/v7i5.652657}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.652657}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4295
TI - Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network
T2 - International Journal of Computer Sciences and Engineering
AU - Syed Muqtar Ahmed, Syed Abdul Sattar
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 652-657
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
372 284 downloads 126 downloads
  
  
           

Abstract

A Wireless Mobile Adhoc network (MANET) is a self-controlled group of multiple nodes establishing a temporary network. MANET nodes have the tendency to change the location from one point to another due to it’s vulnerable and dynamic nature topography, which may invite for several types of cyber-attacks. One of the most dangerous attack is wormhole attack in which two or more malicious nodes could establish a tunnel between them and attract all the neighbours to send the packets though that tunnel by assuring that packet would be delivered to destination through the tunnel’s optimal-route and also assure to deliver all the packets by taking small amount of time delay. Most of the proposed methods to guard against wormhole attack use either clock synchronization or round-trip time technique but our proposed method uses hop-to-hop count technique. The purpose of this research work is to make a solution to detect the most risky and dangerous wormhole attack in the context of mobile Adhoc networks that can drift the normal traffic flow completely. We named this solution as Detection of Collaborative Wormhole Attack in Wireless Mobile Adhoc Network (DC-WAN). An attempt has been done to make an Algorithm to detect Wormhole malicious node(s) based on reactive Adhoc on demand distance vector (AODV) protocol. Several times experiments were conducted on our solution by using NS2 and found that the PDR and Throughput is similar to AODV protocol but the Packet Drop Ratio is fluctuating as time changes.

Key-Words / Index Term

MANET, Cyber attacks, Wormhole attack, AODV, hop-to-hop count

References

[1] S. Singh, R. Kansal, “Novel Technique for Detection of Wormhole Attack in MANET”, International Journal of Computer Sciences and Engineering, Vol.6, Issue. 11, pp. 464-468, Nov 2018.
[2] A. Patel and A. Jain, “A study of various Black Hole Attack techniques and IDS in MANET”, International Journal of Advanced Computer Technology, Vol. 4, Issue. 3, pp. 58-62, 2016.
[3] N. Gandhewar, and R. Patel, “Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Ad Hoc Network”, In Proceedings of the Fourth International Conference on Computational Intelligence and Communication Networks, IEEE Computer Society, pp. 714-718, 2012.
[4] M. Jahnke, J. T¨olle, S. Lettgen, M. Bussmann, and U. Weddige, “A Robust SNMP Based Infrastructure for Intrusion Detection and Response in Tactical MANETs”, Springer-Verlag Berlin Heidelberg, pp. 164–180, 2006.
[5] S. Muqtar Ahmed and S. Abdul Sattar, “International Journal of Computer Science and Engineering”, Vol. 6, Issue. 11, pp. 77-82, 2018.
[6] S. Upadhyay and A. Bajpai, “Avoiding Wormhole Attack in MANET using Statistical Analysis Approach”, International Journal on Cryptography and Information Security,Vol.2, Issue.1, March 2012.
[7] S.Young Shin, E.H. Hartono Halim, “Wormhole Attacks Detection in MANETs using Routes Redundancy and Time-based Hop Calculation”, International Conference on ICT - ieeexplore.ieee.org IEEE, 2012, India.
[8] M. Rmayti, Y. Begriche, R. Khatoun, “Graph-based wormhole attack detection in mobile ad hoc networks”, 4th International Conference on Mobile and Secure Services, 24-25 Feb. 2018, IEEE Xplore: 12 March 2018, USA.
[9] S. Majumder, D. Bhattacharyya, “Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach”, 2018, IEEE, India.
[10] T. V. P. Sundararajan, S. M. Ramesh, R. Maheswa, K. R. Deepak, “Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET”, © Springer Science + Business Media New York 2013, Wireless Networks
May 2014, Volume 20, Issue 4, pp 563–578.
[11] R. Prakash , W. R. Salem and T. Jayasankar “Detection, Prevention and Mitigation of Wormhole Attack in Wireless Adhoc
Network by Coordinator”, Applied Mathematics & Information Sciences, Vol. 12, Issue No. 1, PP. 233-237,2018.
[12] U. K. Singh, J. Patidar and K. C. Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science & Engineering”, Volume-3, Issue-1, pp. 11-16, 2015.