Open Access Open Access  Restricted Access Subscription or Fee Access

A Survey on AODV Approach for Efficient Detection and Mitigation of Wormhole Attack in MANET

Shilpa Vijay, Abhishek Dubey

Abstract


A Mobile Ad-Hoc Network (MANET) is a foundation significantly less or a self-designed aggregating of mobile nodes that can aimlessly control their geographic places such that those networks have dynamic topologies and random mobility with restricted assets. A few attackers attack on MANET to adjust packets and break the connections sooner or later of communiqué. Wormhole attack is one of the active internal attacks in which or extra attacker nodes tunnel the traffic from one place to some other territory inside the network. MANETs might be establishment quick and requiring little to no effort in contrast with foundation systems which might be wired or remote. Wormhole nodes fake a route that is shorter than the original one inside the network means it create phantasm for the valid node so that they consider that the route is shorter than the unique one. But it isn't important that the path via wormhole nodes can be shorter. In this paper, the detailed survey has been performed for various attacks in MANETs. Problem associated with MANETs and Characterstics about MANET.

Keywords: AODV, MANETs, wormhole attack, types of attacks, MANETs’ applications and characteristics

Cite this Article
Shilpa Vijay, Abhishek Dubey. A Survey on AODV Approach for Efficient Detection and Mitigation of Wormhole Attack in MANET. Recent Trends in Parallel Computing. 2018; 5(1): 7–14p.



Full Text:

PDF

References


Mobile Ad-hoc Networks (MANET), http://www.ietf.org/html.charters/manetcharter. html. (1998-11-29).

GeethaJayakumar and GopinathGanapathy, ―Performance Comparison of Mobile Ad-hoc Network Routing Protocol‖ , International Journal of Computer Science and Network Security (IJCSNS), VOL.7 No.11, pp. 77-84 November 2007.

Pallavi Agarwal and Neha Bhardwaj, “Enhance the Security by using Hashing Technique and Trust Values in Vehicular Ad Hoc Networks”, International Journal for Science and Advance Research in Technology (IJSART), Volume 2, Issue 7, July 2016.

R. Maulik and N. Chaki,” A comprehensive Review on Wormhole Attacks in MANET”, in proceeding of 9th International Conference on Computer Information Systems and Industrial Management Applications, (2010), pp. 233-238.

Satheeshkumar, M.B. and M.R. Kalaivani, Privacy Protection Against Wormhole Attacks In Manet. traffic, 2014. 2(1).

Goyal, P., V. Parmar, and R. Rishi, Manet: Vulnerabilities, challenges, attacks, application. IJCEM International Journal of Computational Engineering & Management, 2011. 11(2011): p. 32-37.

Maan, F., Y. Abbas, and N. Mazhar. Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons. in Wireless Advanced (WiAd), 2011. 2011. IEEE.

Nagrath, P. and B. Gupta. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey. in Electronics Computer Technology (ICECT), 2011 3rd International Conference on. 2011. IEEE.

Jhaveri, R.H., S.J. Patel, and D.C. Jinwala. DoS attacks in mobile ad hoc networks: A survey. in Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on. 2012. IEEE.

Hu, Y.-C., A. Perrig, and D.B. Johnson, Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 2006. 24(2): p. 370-380.

Reddy, K.G. and P.S. Thilagam, Taxonomy of Network Layer Attacks in Wireless Mesh Network, in Advances in Computer Science, Engineering & Applications. 2012, Springer. p. 927-935.

caraz, C. and J. Lopez, A security analysis for wireless sensor mesh networks in highly critical systems. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 2010. 40(4): p. 419-428.

Reddy, K.G. and P.S. Thilagam, Intrusion detection technique for wormhole and following jellyfish and byzantine attacks in wireless mesh network, in Advanced Computing, Networking and Security. 2012, Springer. p. 631-637.

Sayan Majumder, Prof. Dr. Debika Bhattacharyya “Mitigating Wormhole Attack in MANET Using Absolute Deviation Statistical Approach” 978-1-5386-4649-6/18/$31.00 ©2018 IEEE.

Roshani Verma et al, “New Approach through Detection and Prevention of Wormhole Attack in MANET”, International Conference on Electronics, Communication and Aerospace Technology ICECA, IEEE 2017.

H.Ghayvat et al, “Advanced AODV Approach For Efficient Detection And Mitigation Of WORMHOLE Attack IN MANET”, Tenth International Conference on Sensing Technology, IEEE 2016.

EO Ochola, MM Eloff and JA van der Poll “Beyond Watchdog Schemes in Securing MANET’s Reactive Protocols Operating on a Dynamic Transmission Power Control Technique” SAI Computing Conference 2016 July 13-15, 2016, 978-1-4673-8460-5/16/$31.00 ©2016 IEEE.

Miss. Supriya Khobragade, Prof. Puja Padiya “Detection and Prevention of Wormhole Attack Based on Delay Per Hop Technique for Wireless Mobile Ad-hoc Network” International conference on Signal Processing, Communication, Power and Embedded System (SCOPES)-2016.

Brijendra Kumar Joshi, Megha Soni “Security Assessment of AODV Protocol under Wormhole and DOS Attacks” 978-1-5090-5256-1/16/$31.00_c 2016 IEEE.

Sunil Kumar Jangir, Naveen Hemrajani “A Comprehensive Review On Detection Of Wormhole Attack In MANET” 978-1-5090-5515-9/16/$31.00 ©2016 IEEE.

Divya Goyal, Amrita Parashar “Trust Computation Using D-S In Sector Based Are To Detect Or Preventing Worm Hole In MANET” 2016 IEEE.

M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi A. Mammeri “Graph-Based Wormhole Attack Detection in Mobile Ad hoc Networks (MANETs)” 2016, IEEE.

Jai Shree Mehta, ShilpaNupur, Swati Gupta, “An Overview of MANET: Concepts, Architecture & Issues”, E-ISSN: 2321-3264, Vol. 3, No. 2, International Journal of Research in Management, Science & Technology, April 2015.


Refbacks

  • There are currently no refbacks.


This site has been shifted to https://stmcomputers.stmjournals.com/