Open Access Open Access  Restricted Access Subscription or Fee Access

Detection and Prevention Techniques of Wormhole Attack- A Survey

Dheerendra Singh Kachhwaha

Abstract


Mobile Ad hoc network is a network made up of wireless mobile nodes without infrastructure. Easy deployment and self configuration are the MANET features used in many applications. Therefore MANET gains a lot of interest of many researchers in the past few years. The Wormhole attack at the network layer is the most attention seeking attack in ad hoc networks. This attack is hard to detect and easy to implement. In this paper, we present a survey on different attacks in Manet their routing protocols, and most importantly Wormhole attack their detection and prevention techniques.

Keywords: MANET, routing protocols, wormhole attack, detection and prevention techniques

Cite this Article
Dheerendra Singh Kachhwaha, Vikas Sejwar. Detection and Prevention Techniques of Wormhole Attack-A Survey. Recent Trends in Parallel Computing. 2015; 2(2): 1–8p.



Full Text:

PDF

References


Benjamin Norman A, Suresh Sankaranarayan. Performance of Wireless Body Sensor based Mesh Network for Health Application. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM). 2010; 2: 20–28p.

Masayuki Nakamura, Atsushi Sakurai, Jiro Nakamura. Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM). 2009; 1: 125–132p.

Reshmi Maulik, Nabendu Chaki. A Study on Wormhole Attacks in MANET. International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM). ISSN 2150-7988. 2011; 3: 271–279p.

Yi S, Kravets R. Composite Key Management for Ad Hoc Networks. Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous‟ 04). 2004; 52–61p.

Bing Wu, Jianmin Chen, Jie Wu, et al. A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. Springer. 2007; 103–135p.

Xiao Y, Shen X, Du D-Z. (Eds.). Wireless/Mobile Network Security. @ 2006 Springer.

Menaka A, Pushpa ME. Trust Based Secure Routing in AODV Routing Protocol. ISSN: 978-1-4244-4793-0/09. IEEE. 2009; 1–6p.

Guler I, Meghdadi M, Ozdemir S. A Survey of Wormhole-Based Attacks and their Counter Measures in Wireless Sensor Networks. IETE Technical Review. 2011; 28(2): 89–102p.

Jain M, Kandwa1 H, A Survey on Complex Wormhole Attack in Wireless Ad-Hoc Network. In Advances in Computing, Control & Telecommunication Technologies. 2009; 555–558p.

Hu YC, Perrig A, Johnson DB. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of the 22nd INFOCOM. 1976–1986. 2003.

Xia Wang, JohnnyWong. An End-to-end Detection of Worm-hole Attack in Wireless Ad-hoc Networks. Department of Computer Science Iowa State University Ames, Iowa 50011.

Hu L, Evans D. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium. 2004.

Phuong TV, Canh NT, Young-Koo Lee, et al. Transmission Time-based Mechanism to Detect Wormhole Attacks. IEEE Computer Society. 2007; 172–178p.

Sun Choi, Doo-Young Kim, Do-Hyeon Lee, et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad hoc Networks. In Proc. of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing. 2008; 343–348p.

Keer S, Suryavanshi A. To Prevent Wormhole Attacks using Wireless Protocol in MANETS. In Int’l Conference on Computer Science and Technology, ICCCT’2010.

Alshamrani A. PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks. In Advanced Information Networking and Applications (WAINA), 2011 IEEE Workshops of International Conference. Mar 2011; 561–568p.

Mokube, Adams M. Honeypots: Concepts, Approaches, and Challenges. In Proceedings of the 45th Annual Southeast Regional Conference. New York, USA: ACM. 2007.

TH. Project. Know Your Enemy. Jul 2000. Available: http://project.honeynet.org/papers.

Chandandeep Kaur et al. Detection and Prevention Techniques for Wormhole Attacks. International Journal of Computer Science and Information Technologies (IJCSIT). 2014; 5(4): 4926–4929p.

Poonam Dabas, Prateek Thakral. Detection and Prevention of Wormhole Attack in MANET: A Review. International Journal of Advanced Research in Computer Science and Software Engineering. Mar 2013; 3(3).

Shivangi Dwivedi, Priyanka Tripathi. An Efficient Approach for Detection of Wormhole Attack in Mobile Ad-hoc Network. International Journal of Computer Applications. 2014; 104(7).

Jyoti Thalor, Monika. Wormhole Attack Detection and Prevention Technique in Mobile Ad Hoc Networks: A Review. International Journal of Advanced Research in Computer Science and Software Engineering. ISSN: 2277 128X. Feb 2013; 3(2).

Nikam Pranjali D, Vanita Raut. Attacks Prevention and Detection Techniques in MANET: A Survey. Int. Journal of Engineering Research and Applications. www.ijera.com, ISSN: 2248-9622. Nov 2014; 4(11) (Version 2): 15–19p.

Patel Bipin N, Patel Tushar S. A Survey on Detecting Wormhole Attack in Manet. Int. Journal of Engineering Research and Application. ISSN: 2248-9622. Mar 2014; 4(3) (Version 1): 653–656p.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/