Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach

  • Saurabh Upadhyay
  • Brijesh Kumar Chaurasia
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 84)

Abstract

A mobile ad hoc network (MANET) consists of a collection of wireless mobile nodes that forms a temporary network without having any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avoiding and preventing the wormhole attacks in MANET using statistical analysis approach. Simulation and results show that efficacy of proposed algorithm and the proposed heuristics provides better security and performance than conventional AODV in the presence of wormhole attack.

Keywords

MANET Wormhole attack Wormhole detection technique Wormhole prevention Statistical mechanism 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Perkins, C., Bhagwat, P.: Highly dynamic destination-sequenc distance-vector routing (DSDV) for mobile computers. In: Proceedings of ACM Conference on Communications Architectures, Protocols and Applications (ACM SIGCOMM 1994), London, UK, pp. 234–244 (1994)Google Scholar
  2. 2.
    Perkins, C., Royer, E.: Ad hoc on-demand distance vector routing. In: Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100 (1999) Google Scholar
  3. 3.
    Perkins, C.E.: Ad hoc Networking. Addison Wesley, Boston (2001)Google Scholar
  4. 4.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)CrossRefGoogle Scholar
  5. 5.
    Zhen, J., Srinivas, S.: Replay Attacks for Secure Routing in Ad Hoc Networks. In: Pierre, S., Barbeau, M., An, H.-C. (eds.) ADHOC-NOW 2003. LNCS, vol. 2865, pp. 140–150. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In: Maughan, W.D., Perrig, A. (eds.) ACM Workshop on Wireless Security (WiSe), pp. 30–40 (2003)Google Scholar
  7. 7.
    Tamilselvan, L., Sankaranarayanan, D.V.: Prevention of impersonation attack in wireless mobile ad hoc networks. International Journal of Computer Science and Network Security (IJCSNS) 7(3), 118–123 (2007)Google Scholar
  8. 8.
    Papadimitratos, P., Haas, Z.J.: Secure routing for mobile ad hoc networks. In: Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (2002)Google Scholar
  9. 9.
    Hu Y.-C., Johnson, D.B., Perrig, A.: SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In: IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 3–13 (2002) Google Scholar
  10. 10.
    Upadhyay, S., Chaurasia, B.K.: Impact of Wormhole Attacks on MANETs. International Journal of Computer Science & Emerging Technologies 2(1), 77–82 (2011)Google Scholar
  11. 11.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communications 11(1), 38–47 (2004)CrossRefGoogle Scholar
  12. 12.
    Perkins, C., Belding-Royer, E., Das, S.: Ad hoc On-Demand Distance Vector (AODV) Routing, RFC 3561 (2003)Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Saurabh Upadhyay
    • 1
  • Brijesh Kumar Chaurasia
    • 2
  1. 1.Sarvottam Institute of Technology and ManagementGreater NoidaIndia
  2. 2.Institute of Technology and ManagementGwaliorIndia

Personalised recommendations