CFP last date
01 May 2024
Call for Paper
June Edition
CAE solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 01 May 2024

Submit your paper
Know more
Reseach Article

Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN

by Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 3
Year of Publication: 2015
Authors: Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja
10.5120/cae2015651896

Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja . Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN. Communications on Applied Electronics. 3, 3 ( October 2015), 6-10. DOI=10.5120/cae2015651896

@article{ 10.5120/cae2015651896,
author = { Mosmi Tiwari, Amrita Tiwari, Deepak Sukheja },
title = { Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN },
journal = { Communications on Applied Electronics },
issue_date = { October 2015 },
volume = { 3 },
number = { 3 },
month = { October },
year = { 2015 },
issn = { 2394-4714 },
pages = { 6-10 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume3/number3/444-2015651896/ },
doi = { 10.5120/cae2015651896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:43:54.695333+05:30
%A Mosmi Tiwari
%A Amrita Tiwari
%A Deepak Sukheja
%T Modified Hop Count Analysis Algorithm (MHCAA) for Preventing Wormhole Attack in WSN
%J Communications on Applied Electronics
%@ 2394-4714
%V 3
%N 3
%P 6-10
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wormhole attack is one of severe security threat may apply on network layer. It is a passive attacks aims to drop packets by creating illusion of shortest path from source to destination. Wormhole nodes attempt to attract the genuine nods by showing an illusion of shortcut from source to destination and registered themselves as next hop at source routing table. When source consider wormhole tunnel as shortest route and transfer packet to wormhole node they start dropping packet respectively. This paper considers this problem as severe issue an attempt to derive a mechanism to detect and prevent wormhole node in mobile ad-hoc networks. The objective of this paper is to study various ways to create wormhole attack and develop techniques to detect and prevent wormhole node using AODV routing protocol.

References
  1. Tarek Mosbah Abdala “Performance Tradeoffs of Routing Protocols in Wireless Sensor Networks” International Conference on Network security & Computer Science (ICNSCS-15) Feb. 8-9, 2015 Kuala Lumpur (Malaysia).
  2. Zainab Dalaf Katheeth “Performance Evaluation with Throughput andPacket Delivery Ratio for Mobile Ad-hoc Networks” International Journal of Advanced Research in Computer and Communication Engineering Vol. 3, Issue 5, May 2014.
  3. R.Sherine Jenny “Simulation based performance comparison of aodv, dsr, fsr routing protocol with wormhole attack.” IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 Vol.3, No1, February 2013
  4. Kapil Raghuwanshi “An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET” International Journal of Computer Applications (0975 – 8887) Volume 110 – No. 7, January 2015.
  5. A.Vani and D. S. Rao, “A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing in Ad Hoc Wireless Networks”, International Journal on Computer Science and Engineering (IJCSE) ISSN: 0975-3397 Vol. 3, No. 6, 2011.
  6. L. Hu and D. Evans “Using Directional Antennas to Prevent Wormhole Attacks” , In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
  7. D. B. Roy, R.Chaki and N. Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks” International Journal of Network Security & Its Applications (IJNSA), Vol. 1, No.1, 2009.
  8. D. S. Kushwaha, A. Khare and J. L .Rana, “Improved Trustful Routing Protocol to Detect Wormhole Attack in MANET”, in International Journal of Computer Applications, Vol. 62, No.7, 2013.
  9. S. Yi, P. Naldurg and R. Kravets, “Security-Aware Ad-hoc Routing for Wireless Networks”, Report No.UIUCDCS-R-2002-2290, UIUC, 2002
  10. H. Deng, W. Li, and D. P. Agrawal, “Routing Security in Wireless Ad Hoc Networks”, Telecommunications Network Security, IEEE Communications Magazine, Vol. 40, No. 10, pp 70-75, 2002.
  11. Z. Alishahi, J. Mirabedini and M. K. Rafsanjani, “A new method for improving security in MANETs AODV Protocol”, Management Science Letters 2 (2012) 2271–2280.
  12. K. S. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  13. Maurice Chu International Journal of High Performance Computing Applications, Scalable Information-Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks
  14. S.M. Jen, C.S. Laih, and W.C. Kuo, “A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET”, Sensors 2009.
  15. K. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  16. L. Qian, N. Song and X. Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path”
  17. Xu Su Rajendra V. Boppana, “On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks”, in proceedings of IEEE Communications Society, ICC 2007.
  18. R. Maheshwari, J. Gao and S. R Das, “Detecting Wormhole Attacks in Wireless Networks using Connectivity Information”,
  19. V. Kumar and A. Kush, “Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol”, International Journal of Computer Applications, Vol. 44, No.4, 2012.
  20. K. Win, “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy of Science, Engineering and Technology 24, 2008.
  21. X. Wang and J. Wong, “An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks”
Index Terms

Computer Science
Information Sciences

Keywords

WSN Worm-Hole AODV