Abstract
When dynamic nature, autonomous, self- configured types nodes are combined together and make contact with each other for the purpose of communication and data sharing; these types of forms networks are known as a mobile ad hoc network. The nodes don't restrict themselves due to physical barrier. They move into any location, place and communicate with the other nodes within their communication range. There is no fixed location of nodes. The dynamic nature of MANET makes it vulnerable to different type of attack. We are considering the wormhole attack which affects the network by transferring the data from one location to another location using a long range tunnel. In this paper, we are evaluating the performance of the proposed scheme with existing schemes such as RTT1, RTT2, DelPHI. The performance of the proposed scheme is measured in terms of throughput, packet delivery ratio, packet loss, average E2E delay and jitter.
This is a preview of subscription content, access via your institution.





Data availability
Not Applicable.
Code availability
Not Applicable.
References
Chlamtac, I., Conti, M., & Liu, J. J. N. (2003). Mobile ad hoc networking: Imperatives and challenges. International Journal of Ad hoc Networks, 1(1), 13–64.
Bruzgiene, R., Narbutaite, L., & Adomkus, T. (2017). MANET network in internet of things system. International Journal of Ad Hoc Networks.
Song, N., Qian, L., & Li, X. (2005). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In 19th IEEE international parallel and distributed processing symposium, proceedings. IEEE.
Song, S., Wu, H., & Choi, B. Y. (2012). Statistical wormhole detection for mobile sensor networks. In 2012 fourth international conference Ubiquitous and future networks (ICUFN) (pp. 322–327). IEEE.
Joshi, B. K., & Soni, M. (2016, December). Security assessment of AODV protocol under wormhole and DOS attacks. In 2016 2nd international conference on contemporary computing and informatics (IC3I) (pp. 173–177). IEEE.
Majumder, S. (2019). Improvement of packet delivery fraction due to wormhole attack by modified DSR and AODV algorithm. In Proceedings of the global AI congress 2019 (p. 81).
Yaseen, Q. M., & Aldwairi, M. (2018). An enhanced AODV protocol for avoiding black holes in MANET. Procedia Computer Science, 134, 371–376.
Ghayvat, H., Pandya, S., Shah, S., Mukhopadhyay, S. C., Yap, M. H., & Wandra, K. H. (2016, November). Advanced AODV approach for efficient detection and mitigation of wormhole attack in MANET. In 2016 10th International conference on sensing technology (ICST) (pp. 1–6). IEEE.
Sankara Narayanan, S., & Murugaboopathi, G. (2018). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32, e5017.
Chiu, H. S. & Lui, K. S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 2006 1st International symposium on wireless pervasive computing (p. 6). IEEE.
Su, M.-Y. (2010). WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Computers and Security, 29, 208–224.
von Mulert, J., Welch, I., & Seah, W. K. G. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of Network and Computer Applications, 35(4), 1249–1259.
Su, X., & Boppana, R. V. (2007). On mitigating in-band wormhole attacks in mobile ad hoc networks. In IEEE international conference on communications (pp. 1136–1141).
Bhawsar, A., Pandey, Y., & Singh, U. (2020). Detection and prevention of wormhole attack using the trust-based routing system. In 2020 international conference on electronics and sustainable communication systems (ICESC). IEEE.
Sankara Narayanan, S., & Murugaboopathi, G. (2020). Modified secure AODV protocol to prevent wormhole attack in MANET. Concurrency and Computation: Practice and Experience, 32(4), e5017.
Kaur, P., Kaur, D., & Mahajan, R. (2017). Wormhole attack detection technique in mobile ad hoc networks. Wireless Personal Communications, 97, 2939–2950.
Khabazian, M., & Ali, M. K. M. (2008). A performance modeling of connectivity in vehicular ad hoc networks. International Journal of IEEE Transactions on Vehicular Technology, 57(4), 2440–2450.
Perkins, C. E., Royer, E. M., Das, S. R., & Marina, M. K. (2001). Performance comparison of two on-demand routing protocols for ad hoc networks. International Journal of IEEE Personal Communications, 8(1), 16–28.
Goyal, M. K., Verma, Y. K., Bassi, P., & Misra, P. K. (2013). Performance analysis of ad hoc on-demand distance vector routing and dynamic source routing using NS2 simulation. In Mobile communication and power engineering (pp. 390–396). Berlin: Springer.
Johansson, P., Larsson, T., Hedman, N., Mielczarek, B., Degermark, M., (1999) Routing protocols for mobile ad-hoc networks-A comparative performance analysis. In Proceedings of the 5th international conference on mobile computing and networking (ACM MOBICOM’99) (pp. 195–206).
Gandhi, S., Chaubey, N., Tada, N., & Trivedi, S. (2012) Scenario-based performance comparison of reactive, proactive and hybrid protocols in MANET. In International conference on IEEE computer communication and informatics (ICCCI) (pp. 1–5).
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561.
Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications, 36(2), 582–592.
Sakthivel, T., & Chandrasekaran, R. M. (2012). Detection and prevention of wormhole attacks in MANETs using path tracing approach.
Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-hop localization against wormhole attacks in wireless sensor networks. International Journal of Pervasive and Mobile Computing, 16, 22–35.
Pirzada, A. A., & McDonald, C. (2006). Detecting and evading wormholes in mobile ad-hoc wireless networks. International Journal of Network Security, 3(2), 191–202.
Qazi, S., Raad, R., Mu, Y., & Susilo, W. (2018). Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks. Journal of Information Security and Applications, 39, 31–40.
Kumar, G., Rai, M. K., & Saha, R. (2017). Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in wireless sensor networks. Journal of Network and Computer Applications, 99, 10–16.
Tiruvakadu, D. S. K., & Pallapa, V. (2018). Confirmation of wormhole attack in MANETs using honeypot. Proceedings of the Computers and Security, 76, 32–49.
Acknowledgments
The authors are thankful to the Department of RIC, I.K.G. Punjab Technical University, Kapurthala, Punjab, India and providing me opportunity to carry out my research work.
Funding
Not Applicable.
Author information
Authors and Affiliations
Contributions
Not Applicable.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that there is no conflict of interest regarding the publication of this paper.
Ethics approval
Not Applicable.
Consent to participate
Not Applicable.
Consent for publication
Not Applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Kaur, P., Kaur, D. Performance Evaluation of the Proposed Wormhole Detection Scheme with Existing Schemes. Wireless Pers Commun 119, 2227–2237 (2021). https://doi.org/10.1007/s11277-021-08327-0
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08327-0