Skip to main content
Log in

Performance Evaluation of the Proposed Wormhole Detection Scheme with Existing Schemes

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

When dynamic nature, autonomous, self- configured types nodes are combined together and make contact with each other for the purpose of communication and data sharing; these types of forms networks are known as a mobile ad hoc network. The nodes don't restrict themselves due to physical barrier. They move into any location, place and communicate with the other nodes within their communication range. There is no fixed location of nodes. The dynamic nature of MANET makes it vulnerable to different type of attack. We are considering the wormhole attack which affects the network by transferring the data from one location to another location using a long range tunnel. In this paper, we are evaluating the performance of the proposed scheme with existing schemes such as RTT1, RTT2, DelPHI. The performance of the proposed scheme is measured in terms of throughput, packet delivery ratio, packet loss, average E2E delay and jitter.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

Not Applicable.

Code availability

Not Applicable.

References

  1. Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. International Journal of Ad hoc Networks, 1(1), 13–64.

    Article  Google Scholar 

  2. Bruzgiene, R., Narbutaite, L., & Adomkus, T. (2017). MANET network in internet of things system. International Journal of Ad Hoc Networks.

  3. Song, N., Qian, L., & Li, X. (2005). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In 19th IEEE international parallel and distributed processing symposium, proceedings. IEEE.

  4. Song, S., Wu, H., & Choi, B. Y. (2012). Statistical wormhole detection for mobile sensor networks. In 2012 fourth international conference Ubiquitous and future networks (ICUFN) (pp. 322–327). IEEE.

  5. Joshi, B. K., & Soni, M. (2016, December). Security assessment of AODV protocol under wormhole and DOS attacks. In 2016 2nd international conference on contemporary computing and informatics (IC3I) (pp. 173–177). IEEE.

  6. Majumder, S. (2019). Improvement of packet delivery fraction due to wormhole attack by modified DSR and AODV algorithm. In Proceedings of the global AI congress 2019 (p. 81).

  7. Yaseen, Q. M., & Aldwairi, M. (2018). An enhanced AODV protocol for avoiding black holes in MANET. Procedia Computer Science, 134, 371–376.

    Article  Google Scholar 

  8. Ghayvat, H., Pandya, S., Shah, S., Mukhopadhyay, S. C., Yap, M. H., & Wandra, K. H. (2016, November). Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET. In 2016 10th International conference on sensing technology (ICST) (pp. 1–6). IEEE.

  9. Sankara Narayanan, S., & Murugaboopathi, G. (2018). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32, e5017.

    Google Scholar 

  10. Chiu, H. S. & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International symposium on wireless pervasive computing (p. 6). IEEE.

  11. Su, M.-Y. (2010). WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computers and Security, 29, 208–224.

    Article  Google Scholar 

  12. von Mulert, J., Welch, I., & Seah, W. K. G. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of Network and Computer Applications, 35(4), 1249–1259.

    Article  Google Scholar 

  13. Su, X., & Boppana, R. V. (2007). On mitigating in-band wormhole attacks in mobile ad hoc networks. In IEEE international conference on communications (pp. 1136–1141).

  14. Bhawsar, A., Pandey, Y., & Singh, U. (2020). Detection and prevention of wormhole attack using the trust-based routing system. In 2020 international conference on electronics and sustainable communication systems (ICESC). IEEE.

  15. Sankara Narayanan, S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.

    Article  Google Scholar 

  16. Kaur, P., Kaur, D., & Mahajan, R. (2017). Wormhole attack detection technique in mobile ad hoc networks. Wireless Personal Communications, 97, 2939–2950.

    Article  Google Scholar 

  17. Khabazian, M., & Ali, M. K. M. (2008). A performance modeling of connectivity in vehicular ad hoc networks. International Journal of IEEE Transactions on Vehicular Technology, 57(4), 2440–2450.

    Article  Google Scholar 

  18. Perkins, C. E., Royer, E. M., Das, S. R., & Marina, M. K. (2001). Performance comparison of two on-demand routing protocols for ad hoc networks. International Journal of IEEE Personal Communications, 8(1), 16–28.

    Article  Google Scholar 

  19. Goyal, M. K., Verma, Y. K., Bassi, P., & Misra, P. K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using NS2 simulation. In Mobile communication and power engineering (pp. 390–396). Berlin: Springer.

  20. Johansson, P., Larsson, T., Hedman, N., Mielczarek, B., Degermark, M., (1999) Routing protocols for mobile ad-hoc networks-A comparative performance analysis. In Proceedings of the 5th international conference on mobile computing and networking (ACM MOBICOM’99) (pp. 195–206).

  21. Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2012) Scenario-based performance comparison of reactive, proactive and hybrid protocols in MANET. In International conference on IEEE computer communication and informatics (ICCCI) (pp. 1–5).

  22. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561.

  23. Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications, 36(2), 582–592.

    Article  Google Scholar 

  24. Sakthivel, T., & Chandrasekaran, R. M. (2012). Detection and prevention of wormhole attacks in MANETs using path tracing approach.

  25. Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-hop localization against wormhole attacks in wireless sensor networks. International Journal of Pervasive and Mobile Computing, 16, 22–35.

    Article  Google Scholar 

  26. Pirzada, A. A., & McDonald, C. (2006). Detecting and evading wormholes in mobile ad-hoc wireless networks. International Journal of Network Security, 3(2), 191–202.

    Google Scholar 

  27. Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31–40.

    Article  Google Scholar 

  28. Kumar, G., Rai, M. K., & Saha, R. (2017). Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. Journal of Network and Computer Applications, 99, 10–16.

    Article  Google Scholar 

  29. Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Proceedings of the Computers and Security, 76, 32–49.

    Article  Google Scholar 

Download references

Acknowledgments

The authors are thankful to the Department of RIC, I.K.G. Punjab Technical University, Kapurthala, Punjab, India and providing me opportunity to carry out my research work.

Funding

Not Applicable.

Author information

Authors and Affiliations

Authors

Contributions

Not Applicable.

Corresponding author

Correspondence to Parvinder Kaur.

Ethics declarations

Conflict of interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Ethics approval

Not Applicable.

Consent to participate

Not Applicable.

Consent for publication

Not Applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kaur, P., Kaur, D. Performance Evaluation of the Proposed Wormhole Detection Scheme with Existing Schemes. Wireless Pers Commun 119, 2227–2237 (2021). https://doi.org/10.1007/s11277-021-08327-0

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08327-0

Keywords

Navigation