Conference Paper

New approach through detection and prevention of wormhole attack in MANET

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... From [11], Roshani Verma, et al. Brought forward an approach to alleviate the impact of wormhole sort of attack. ...
... In [11], the assessment is carried using the NS2. The evaluation variables such as PDR, throughput, delay as well as speed are pondered. ...
Article
MANET is a class of network, which is customarily embracing numerous mobile nodes that do not hold any firm organization. The MANET hold peculiarities such as circumscribed battery power, bandwidth, range, security, etc, which has primarily become the reason for researchers to carry out the study. In MANETs, the transmission of the packets from the initiator to the destined nodes is regularly done via the midway nodes in the network, hence proving security to be a vital affair. There are certain categories of attacks that are prevalent in MANETs that regularly demote the system performance. In this work, the proposal is to perform comprehensive study on the numerous sorts of attacks that are prevailing in the MANETs together with their alleviation strategies put forth by numerous researchers. Post per-forming this study, there are some proposals to the studied existing alleviation strategies; which helps to provide and improve the performance and security issues.
... The security of ad hoc networks is enhanced by this proposed algorithm. Such kinds of attacks are prevented from this network [10]. The packet delivery ratio is increased and the control overhead is minimized through the enhancement of routing protocols in the networks. ...
... Verma et al. [26] presented a wormhole attack detection method using packet delivery ratio (PDR) and RTT for nodes. If the RTT of the node is below the specified threshold, it is indicative of a wormhole attack. ...
Article
Full-text available
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET) technologies, which enable the formation of networks without infrastructure assistance, gaining increased attention. The advancements in these technologies have also resulted in the variety of attacks targeting them becoming more diversified. Particularly, owing to their inability to ensure node reliability, MANETs are vulnerable to routing attacks such as wormhole attacks. Since wormhole attacks often do not directly damage networks, detecting them can be challenging. In response, we propose a novel multiple verification-based wormhole attack detection method that leverages the characteristics of such attacks. The proposed method measures the credit of each node based on a trust system. The trust levels of suspicious nodes are reduced during routing; those with trust levels below a certain threshold are considered malicious. This trust system was implemented using reinforcement learning, which improves the accuracy of the system over time. Simulation experiments in which the proposed method was applied to existing routing methods in a densely populated environment were conducted; the rate of traffic passing through paths with malicious nodes was significantly reduced.
... Among the above attacks, the wormhole attack is one of the most harmful attacks, changing network topology structure and reducing node positioning accuracy [21,22]. At present, Distance Vector Hop (DV-Hop) algorithm is one of the leading technologies of node localization. ...
Article
Full-text available
IoT era and its ubiquitous sensing raise serious security challenges such as wormhole attacks. Given that these attacks may affect the location determination of the employed sensors, security can be seriously compromised. The most common and severe attack is the single wormhole one, which is the focus of this paper. One of the most employed algorithms to approach the sensor location determination is the Distance Vector Hop (DV-Hop) algorithm, which can still be seriously affected from wormhole attacks. To overcome the challenges of this algorithm, this article proposes a novel secure DV-Hop localization algorithm against wormhole attack (ANDV-Hop), where beacon nodes delegate their attacked neighboring nodes to broadcast data messages, and the intersection of communication range of these neighboring nodes does include wormhole nodes. For implicit attacks, close nodes to the wormhole node are selected in order to broadcast data messages, whilst the nodes within the attack range remove beacon nodes at the other end of the link from the neighboring list. For explicit wormhole attack, the algorithm employs a trust model that calculates the comprehensive trust value obtained via a selection reward/punish coefficient. The selected ones within the intersection zone are considered rewarded, whilst the ones to be removed are classified as punished. Experimental results show that the proposed algorithm improves detection success rate, reduces relative localization error and energy loss, showing effectiveness and reliability.
... We have noticed some work in the literature moving in this direction. [17] considered honesty and intimacy, while [18] considered honesty, competency, reliability and maliciousness as social trust components to define trust relationships. In addition, we observe that energy consumption is an important QoS trust component for improving the network performance [17,19]. ...
Article
Full-text available
It is imperative to address the issue of secure routing in mobile ad-hoc networks (MANETs) where the nodes seek for cooperative and trusted behaviour from the peer nodes in the absence of well-established infrastructure and centralized authority. Due to the inherent absence of security considerations in the traditional ad-hoc routing protocols, providing security and reliability in the routing of data packets is a major challenge. This work addresses this issue by proposing a composite trust metric based on the concept of social trust and quality-of-service (QoS) trust. Extended from the ad-hoc on-demand distance vector (AODV) routing protocol, we propose an enhanced trustbased model integrated with an attack-pattern discovery mechanism, which attempts to mitigate the adversaries craving to carry out distinct types of packet-forwarding misbehaviours. We present the detailed mode of operations of three distinct adversary models against which the proposed scheme is evaluated. Simulation results under different network conditions depict that the combination of social and QoS trust components provides significant improvement in packet delivery ratio, routing overhead, and energy consumption compared to an existing trust-based scheme.
... This attack infiltrates the network of 2 or more illegitimate nodes which send messages to each other using low latency and high bandwidth channel, which becomes attractive to legitimate nodes, causing them to use a compromised transmission medium. Different solution methods have been proposed for this attack [1,8,14,20,20,21,25,28,29,33,39,44,52,56,58,59,70,84,85,108,117,118,121,126,127,129,140], 27 proposals in total. ...
Article
Full-text available
Wireless sensor networks (WSN) were cataloged as one of the most important emerging technologies of the last century and are considered the basis of the Internet of Things paradigm. However, an undeniable disadvantage of WSN is that the resources available for these types of networks, such as processing capacity, memory, and battery, are usually in short supply. This limitation in resources implements security mechanisms a difficult task. This work reviews 93 recent proposals in which different solutions were formulated for the different attacks in WSN in the network layer; in total, 139 references were considered. According to the literature, these attacks are mainly Sybil, wormhole, sinkhole, and selective forwarding. The main goal of this contribution is to present the evaluation metrics used in the state of the art to mitigate the Sybil, wormhole, sinkhole, and selective forwarding attacks and show the network topologies used in each of these proposals.
... 17. Roshani Verma, et al. [2017] the main of this paper is the identification and elimination of wormhole attack during the transmission and propagation processes[22]. The security of ad hoc networks is enhanced by this proposed algorithm. ...
Article
Full-text available
All around the world, majority of people depends upon wireless adhoc network. So it becomes the most priority to reduce the vulnerability of Wireless network. Wireless networks are exposed to many different types of attacks out of which wormhole attack is most dangerous. Unlike many other attacks on ad hoc routing, wormhole attack is very powerful and cannot be prevented with cryptographic means because intruders does not modify the packet data ,it simply replays the packets. A strategic placement of the wormhole can result in a significant breakdown in communication. In this paper, study of some existing techniques for detection and prevention of wormhole attack is presented.
... Furthermore the Total Variability Coefficient Of determination is used to calculate the packet drop trend for the wormholes. Roshani Verma, et.al, (2017) [11] The main purpose of this paper was to identify and eliminate wormhole assault during propagation and replication. This suggested algorithm improves the security of ad hoc networks. ...
Article
Full-text available
MANET which have been autonomous and conscience may be adapted to any scenario. The configuration of these network nodes is complex in the ad hoc networks and this fundamentally changes the interdependencies among them. The network devices connected to these mobile nodes need to link, execute, and make routing that provides high levels of performance and resistance to any risks and security issues that could emanate from the network easier for this integrity of deployment. Artificial intelligence technologies may be provided to provide and manage a stable and safe infrastructure for the MANET to run. This paper explores in particular how AI techniques can be used for safer routing and networking between mobile dynamic nodes in MANETs. The paper examines different types of threats facing MANETs and different routing protocols that interact with nodes in MANETs. In MANET, to protect contact the preventive method is important. Multiple challenges such as worm-hole attack (WH), Greyhole (GH) attack and blackhole (BH) attacks can easily affect MANET, in which sender hubs can not pass the response from the target node as a result of their misconduct. This research proposes a new routing protocol as the Protocol of the African Buffalo Monitoring Area to prevent assaults in MANET. This framework constantly tracks the contact channel and detects the threat. The ABMZP solution consecutively avoids dangerous nodes and identifies the alternative connectivity path.
... In [26], authors proposed a technique on detection of wormhole node by modifying the existing DSR routing protocol and avoiding that n ode during further packet routing. In [27], authors proposed a detection scheme for active and passive wormhole nodes using Packet Delivery Ratio (PDR) for each nodes and a Round Trip Time (RTT). If PDR for any node is less than one and the packet delivered through that node has an RTT less than some threshold value, it is treated to be the active wormhole attack and if PDR is not less than one but RTT is less than threshold, it's treated to be Passive wormhole attack. ...
Conference Paper
Full-text available
Vehicular Ad-hoc network (VANET) is a very promising and upcoming technology used for traffic management and for facilitating road safety along with entertainment system. Implementation of VANET requires building trust among the vehicle owners. Without developing trust, it cannot make any vehicle owners to be a part of vehicular network and without active participation of vehicle owners, V ANETs cannot be completely implemented. Therefore, providing security and maintaining the owner's privacy has become a major issue in V ANETs. To provide better security and maintain privacy, one should understand the various possible attacks on the network and the nature of their behavior. Various research papers over the years have discussed about V ANET architecture, Application areas, Challenges and security issues. Most of the papers discuss about the security services and the related work on security but a deeper understanding on each type of attacks on network will help any researcher to develop a security mechanism and the proposed solution can work optimally against one or multiple security attacks. This paper presents a comprehensive survey on various attacks and the proposed solutions by the various researchers and also analysis and comparison of results for the simulated proposed solutions.
... In [26], authors proposed a technique on detection of wormhole node by modifying the existing DSR routing protocol and avoiding that n ode during further packet routing. In [27], authors proposed a detection scheme for active and passive wormhole nodes using Packet Delivery Ratio (PDR) for each nodes and a Round Trip Time (RTT). If PDR for any node is less than one and the packet delivered through that node has an RTT less than some threshold value, it is treated to be the active wormhole attack and if PDR is not less than one but RTT is less than threshold, it's treated to be Passive wormhole attack. ...
... In MANET, nodes can act as intermediate hop or router to provide a route between two end nodes that can communicate through this path formed by intermediate nodes. These paths are formed using one of several standards or customized routing protocols following a specific mechanism linked to those protocols which can be categorized as proactive, reactive, and hybrid [2]. All these routing protocols might create a loophole in the security of the network due to their intrinsic properties. ...
Article
Full-text available
A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managing mobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks. The malicious node exploits these vulnerabilities to lunch attacks, especially when nodes have mobility and network do not have constant topology, like wormhole attack. This paper presents a lightweight technique that detects the wormhole attacks in MANET. In the proposed technique, the source node calculates the average sequence number of the reply (RREP) packets. If the sequence number of the corresponding node exceeds the calculated average value of the sequence number, then all traffic is discarded, and the node is marked as malicious. The proposed technique is less complex, power-efficient, and enhances network lifetime as more data packets are delivered to the destination node. This technique is validated through comprehensive simulations results in NS2.
... The security of ad hoc networks is enhanced by this proposed algorithm. Such kinds of attacks are prevented from this network [9]. The packet delivery ratio is increased and the control overhead is minimized through the enhancement of routing protocols in the networks. ...
Article
Full-text available
The Internet of Things (IoT) is considered a significant innovation by researchers and industry leaders, offering significant advancements in daily life through the use of smart objects that communicate with one another over the internet. Moreover, because IoT devices are resource-constrained and low-cost, implementing an effective security model has emerged as a major technical challenge in recent years. Among the security threats to wireless networks, the wormhole attack is a particularly important and vulnerable issue, as it can disrupt various routing protocols through its activation in various modes. In the transmission of data from a source node to a destination node in network, compromised nodes, also known as wormhole nodes or attackers, may leak or alter the routing information of a specific path. These paths, which contain malicious nodes, are referred to as wormhole paths. To enhance security in IoT, it is crucial to identify and secure such paths. This research presents a novel model aimed at detecting and preventing wormhole attacks to ensure the secure transmission of data in IoT networks. The proposed model comprises two main phases: (a) the detection phase which utilizes an adaptive Deep Neural Network (DNN) based on the Crow Search with Bird Swarm Optimization (CS-BSO) algorithm to detect wormhole attacks across k-different paths, and (b) the prevention phase which utilizes the CS-BSO algorithm in combination with the Bird Swarm Algorithm (BSA) and Crow Search Algorithm (CSA) to determine the optimal path for data transmission. This optimal path selection is based on a multi-objective function that considers network parameters such as delay or latency, energy, packet loss ratio, distance, and throughput, effectively protecting the network from wormhole attacks.
Chapter
In contrast to wired networks, a wireless sensor network has widely dispersed nodes in an unguided and unsupervised environment, making an attack by an adversary much more possible than in the former. As a result, protecting these sensor nodes from harm is of paramount importance. Because a single sensor node's transmission range is restricted and cannot transfer packets over a long distance, a partnership between sensor nodes is necessary to allow packets to be sent and communicated. Neighbour discovery is the method through which a node determines its next-door neighbour. A connection is then built between nodes to transfer the packet in a one hop distance once communication has been established. Once the packets have arrived at their destination, the procedure is then repeated. Malicious nodes may connect with each other over low-latency links if they can attach themselves to a real node. This paper mainly focuses on the malicious attacks as wormhole and tested on 25 nodes set-up in NS2 simulation. The findings of the paper is the evaluation of parameters like E2E delay, throughput of the communication network. According to the findings of the article, the performance of the network is disrupted in every area of communication during the wormhole. When using an ad hoc network, it is necessary to pay close attention in order to prevent being targeted by malicious nodes and activities. This work is to give attention on security issue of the network and the malicious activities from the intruders which hacked the data and miscommunicate the network performance.
Conference Paper
Mobile Ad-hoc Network (MANET) is special types of mobile wireless network where the groups of mobile devices form a temporary network without any kind of an infrastructure. It is very usefully due to its self maintenance, self organizing and by reason of mobility of wireless communication. Two major issues are found in such kind of network performance and security. In mobile ad-hoc network there are so many attacks which reduced the performance of network. In this paper we have focus only active attacks in network layer. Ad Hoc On-Demand Vector Routing protocol is a reactive routing protocol for ad hoc networks that maintain routes only between nodes which want to communicate by using routing messages. AODV provide loop free routes during link breakages. SAODV is a secure routing protocol based on trust model for mobile ad-hoc network. For provide security and increase performance in MANET, we have applied SAODV protocol and our solution uses Hybrid Cryptography Technique (DES, RSA Algorithms) on SAODV. This paper presents comparison based on simulation of AODV, SAODV routing protocol of MANET with Different parameters like energy, packet delivery ratio and throughput. The proposed cryptographic routing algorithm is implemented through the NS2 network simulation environment. The outcome of our proposed method the energy is low; packet delivery ratio and throughput are high as compare to traditional method.
Conference Paper
A mobile ad-hoc network is a wireless network such that nodes are move dynamically in network. In OSI network layer there is lot of attack but introduce only collaborative black hole and worm hole attack. A group of black hole node easily employed against routing in mobile ad-hock networks called collaborative black hole attack. When two malicious node is create a tunnel is called worm hole attack. This paper instigate to detect and avoided of worm hole attack and collaborative black hole attack using trusted AODV routing algorithm.
Article
Mobile ad hoc network (MANET) is lacking infrastructure support, so nodes of MANET are vulnerable to attacks. Denial of Service attacks (DOS) makes network inaccessible to users. Black hole attack is a type of DOS attack, in which mischievous node claims that it has a route towards the destination node. Ad Hoc on Demand Distance Vector (AODV) routing protocol is affected by Black hole attack. The proposed solution is based on first Route Reply (RREP) caching mechanism in AODV protocol. Simulation results show performance improvement in routing protocol.
Conference Paper
Availability is important property of Mobile ad hoc network (MANETs), without which routing & other type of communication is not possible. Availability is compromised by Denial of Service (DOS) attacks. Due to inherent property of MANET, they are susceptible to different kinds of DOS attacks. This paper aims to classify DOS attacks on MANETs, which are primarily performed on network and lower layers. Counter measuring techniques of these DOS attacks are also presented.
Trust Based Solution for Wormhole Attacks in Mobile Ad hoc Networks
  • Ashish Kumar Jain
  • Ravindra Verma
Detection and Avoidance of Integrated Attacks on MANET using Trusted Hyperbolic AODV Routing Protocol
  • Ashish Kumar Jain
  • Vrinda Tokekar
  • Upendra Singh
Security upgrading of Mobile Ad Hoc Networks using Clustering Approach
  • Upendra Singh
  • Makrand Samvatsar
  • Neeraj Arya
Performance Evaluation For Mobile Ad- Hoc Networks On Black Hole Aodv And Taodv
  • Ashish Sharma
  • Upendra Singh