TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS

Authors

  • Ashish Kumar Jain Ravindra Verma Associate Professor, Computer Engineering, Institute of Engineering & Technology, Devi Ahilya Vishwa Vidyalaya, Indore, INDIA. PG student, Information Technology, Institute of Engineering & Technology, Devi Ahilya Vishwa Vidyalaya, Indore, INDIA.

Keywords:

wormhole attack, MANET, Threshold, RTT, RREQ, Hop count

Abstract

MANET (Mobile ad hoc network) is one of the most frequently used research domain in communication technology. MANET provides random mobility, decentralized control and wireless communication. Due to these properties, in current scenario the network suffers from various security threats and performance issues. Therefore, security enhancement in MANET is required. In MANET, security can be improved by cryptography and trust based solution.  We are investigating a new solution using trust based approach in MANET.

There are various attacks on network layer in MANET. Wormhole attack is a severe attack; malicious node by cooperating with another node forwards the packets from one node to another by creating a tunnel. There by these cooperative mischievous nodes attract the legitimate traffic to use their tunnel. Hence security is compromised.

In order to defend against the wormhole attach the proposed work uses, combination of parameters like energy, number of  connections and buffer length  of a node. Trust value of node is computed based on these parameters. The approach compares trust of node with threshold value of network trust. The result of this comparison clarifies that selected node is either malicious or legitimate.

The proposed concept is implemented by extending AODV (Ad hoc On Demand Distance Vector) routing protocol and the performance of the proposed routing protocol is evaluated and compared with the AODV under attack. According to the comparative outcomes the performance of the proposed trust based  security approach is much efficient and adoptable against wormhole attacks in MANET.

References

Yudhvir singh et al., wormhole Attack Avoidance Technique in Mobile Adhoc Networks, Conference on Advanced Computing & Communication Technologies, IEEE,2013.

Jin-Hee Cho, Kevin S. Chan, Ing-Ray Chen et al., Composite Trust-based Public Key Management in Mobile Ad Hoc Networks, ACM 28th Symposium on Applied Computing,2013

Marianne Azer, Sherif EI-Kassas, Magdy EI-Soudani et al., International Journal of Computer Sceince and Security, May 2009.

Gurpreet Kaur, Er. Sandeep Kaur Dhanda et al., International Journal of Advanced Research in Computer and Communication Engineering, August 2013

Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat, Issa Traore et al.,Timed And Secured Monitoring Implementation Against Wormhole Attack in AODV-Based Mobile Ad Hoc Networks, IEEE, May 2013

Mohammad Rafiqul Alam, King Sun Chan et al.,RTT-TC: Topological Comparison Based Method to Detect Wormhole Attacks in MANET, IEEE, 2010

Soo Young Shin, Eddy Hartono Halim eet al., Wormhole Attack Detection in MANETs using Route Redundancy and Time-based Hop Calculation, IEEE,2012.

Naveen Kumar Gupta, Kavita Pandey et al., Trust Based Ad-hoc On Demand Routing Protocol for MANET,IEEE, 2013

Chee-Wah Tan, Sanjay Kumar Bose,et al.,Modifying AODV for Efficient Power-Aware Routing in MANETs,IEEE,2011

Aarti, Dr. S.S. Tyagi et al., Study of MANET: Characteristics, Challenges, Application and Security Attacks, International Journal of Advanced Research in Computer Science and Software Engineering, 2013

A. Jain and V. Tokekar. “Classification of denial of service attacks in mobile ad hoc networks,” Proceedings of International Conference on Computational Intelligence and Communication Networks (CICN), pages 256–261, 2011

A. Jain and V. Tokekar, “Mitigating the effects of Black hole attacks on AODV routing protocol in Mobile Ad hoc Networks”,Proceedings of International conference on pervasive computing (ICPC), 2015.

Downloads

Published

2015-11-30