Skip to main content
Log in

Proactive Prevention Key Solution for Wormhole Attack in IEEE 802.11 Networks Using AODV

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Over the last few years there has been explosive growth in the use of the Wireless communications from top to bottom i.e. Satellite transmission to home Wireless personal area networks. The primary advantage of a wireless network is the ability of wireless node to communicate with the universe during mobility. Two basic system models of a wireless system are fixed and Mobile Adhoc Network has been developed for the wireless network paradigm. The first model consists of multiple numbers of mobile workstations and relatively fewer but more powerful, having fixed routers. The second model has been proposed to set up a network on-demand basis. When a collection of wireless mobile nodes are capable of communicating with each other without the use of network infrastructure, centralized administration, or centralized control like mobile switching centers or base stations, that set up is called Mobile Adhoc Network. Here each mobile node operates not only as a host but also as a router, forwards packets to other mobile nodes in the network that may not be within direct wireless transmission range of each other. Each node participates in an Adhoc routing protocol (Yadav et al. in Comput Netw 118:15–23, 2017) that allows it to discover multiple paths through the network to any other node. Institute of Electrical and Electronics Engineers 802.11 (IEEE 802.11) [Kaur et al. in Int J Res Advent Technol 5(8), 2017] is a vital part of pervasive networks, which is a special kind of network where users can join and communicate anytime or anywhere on the fly. It is a popular kind of network because its applications cover a variety of areas. A unique communication paradigm is used which is able to run without fixed infrastructure and relies on wireless terminals for routing and transporting services. A number of security and scalability issues arise due to its wireless transmissions and unpredictable topology changes. Open standard, dynamic topology, scattered arrangements, and multi-hop routing are crucial features of IEEE 802.11 networks that make them vulnerable to various kinds of attacks. A Wormhole attack is one of the serious kinds of attack. Thus, security is the most important concern in IEEE 802.11 networks. This paper presents the refurbishment of the routing structure of Ad hoc On-Demand Distance Vectors (AODV) protocol (Ning et al. in Proceedings of the IEEE systems, man and cybernetics society information assurance workshop (IAW), West Point, New York, USA, pp 60–67, 2003). It will be helpful to safeguard IEEE 802.11 networks from Wormhole attacks by preventing Wormhole Attacks. The DAPS technique had been presented in Saini et al. (Int J Res Advent Technol 6(4), 2018) to detect Wormhole Attacks. Further to DAPS technique, a new Wormhole prevention technique has been introduced in this paper called Proactive Prevention Key Solution (PPKS).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Availability of data and material

Data and material is available in this paper.

Code Availability

Code created or generated during this study are included in this paper.

Data Availability

All data generated or analyzed during this study are included in this published article along with its supplementary information files.

References

  1. Parminder Kaur Saini, Pankaj Kumar Verma, J. S Sohal (2018). DAPS for Detecting Wormhole Attacks in IEEE 802.11 networks using ad hoc On-demand distance vector routing protocol. International Journal of Research in Advent Technology, 6(4), E-ISSN: 2321-9637.

  2. Aashima, Vishal Kumar Arora (2014). Detection and prevention of wormhole attack in MANET using DSR protocol. IOSR Journal of Computer Engineering (IOSR-JCE), 16(6), Ver. VIII, PP 44–47. e-ISSN: 2278-0661, p-ISSN: 2278-8727

  3. Shahjahan Ali, Parma Nand, Shailesh Tiwari (2020). Impact of wormhole attack on AODV routing protocol in VANET over real map with detection and prevention approach. International Journal of Vehicle Information and Communication Systems, 2020, Vol. 5, No. 3. pp. 354-373.

  4. Ghugar, J., & Pradhan, J. (2019). A review on Wormhole attacks in wireless sensor networks. Research gate.

  5. Parminder Kaur, P. K, Verma, J.S. Sohal, (2017). A review of Wormhole attacks for IEEE 802.11 networks. International Journal of Research in Advent Technology, 5(8). E-ISSN: 2321-9637.

  6. Mohammed, D., Omer, M., & Nguyen, V. (2018). Wireless sensor network security: Approaches to detecting and avoiding wormhole attacks. Journal of Research in Business, Economics and Management.

  7. Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M. (2006). True Link: A practical counter measure to the Wormhole attack in Wireless Networks. IEEE Explore.

  8. Tackett, J. (1998). A book on “Using Linux”, Steven Forrest Burnett. ISSN - 13: 978-0-585-13028-6, ISBN: 0-585-13028-0.

  9. Gupta, S., & Das, B. (2013). An energy efficient and load aware routing scheme in multi sink wireless sensor networks. International Journal of Engineering Research and Development, 6(11), 31–35. Google Scholar.

  10. Sarkar, D., Choudhury, S., & Majumder, A. (2018). Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. Journal of King Saud University-Computer and Information Sciences, 1–25.

  11. P. Ning, K. Sun (2003). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the IEEE systems, man & cybernetics society information assurance workshop (IAW), West Point, New York, USA (pp. 60–67).

  12. Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23. CrossRef Google Scholar.

  13. Van Glabbeek, R., Höfner, P., Portmann, M., & Tan, W. L. (2016). Modeling and verifying the AODV routing protocol. Distributed Computing, 29, 279–331. https://doi.org/10.1007/s00446-015-0262-7

    Article  MathSciNet  MATH  Google Scholar 

Download references

Funding

The authors declare that no funds, grants, or other support were received during the preparation of this manuscript from any resources.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study's conception and design. Material preparation, data collection and analysis were performed by Dr. Parminder Kaur Saini. The first draft of the manuscript was written by Dr. Parminder Kaur Saini. Dr. Amanpreet Singh commented on previous versions of the manuscript and Dr. J.S. Sohal contributed to the proofreading of the manuscript. All the authors read and approved the final manuscript.

Corresponding author

Correspondence to Parminder Kaur Saini.

Ethics declarations

Conflict of interest

There is no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Saini, P.K., Singh, A. & Sohal, J.S. Proactive Prevention Key Solution for Wormhole Attack in IEEE 802.11 Networks Using AODV. Wireless Pers Commun 128, 89–108 (2023). https://doi.org/10.1007/s11277-022-09942-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09942-1

Keywords

Navigation