Performance Analysis of Prevention of AODV-based Mobile AdHoc Networks under Cooperative Wormhole Attacks

Authors

  • A. S. Bhandare  Assistant Professor Department of Information Technology, Padmabhooshan Vasantraodada Patil Institute of Technology, Budhgaon, Maharashtra, India
  • Prof. B. S. Patil  Associate Professor Department of Information Technology, Padmabhooshan Vasantraodada Patil Institute of Technology, Budhgaon, Maharashtra, India
  • M. A. Khade  Assistant Professor Department of Information Technology, Padmabhooshan Vasantraodada Patil Institute of Technology, Budhgaon, Maharashtra, India
  • S. D. Patil  Assistant Professor Department of Information Technology, Padmabhooshan Vasantraodada Patil Institute of Technology, Budhgaon, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT183841

Keywords:

MANET, AODV, HSAM, E-HSAM

Abstract

A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or nodes) moving arbitrary in the places that have no network infrastructure called as Mobile Ad-hoc Network (MANET). As MANET does not have fixed infrastructure and central administration, due to security vulnerabilities of the routing protocols, wireless ad-hoc networks are unprotected to attacks of nodes. Wormhole attack is one of the severe attacks which absorb all data packet instead of sending it to destination. An Enhanced HSAM technique is used in order to compare the different performance parameters with HSAM and the results are monitored with the use of network simulator.

References

  1. R Jhaveri, A. Patel, J. Parmar, and B. Shah, \MANET Routing Protocols and Wormhole Attack against AODV," International Journal of Computer Science and Network Security, vol. 10, pp. 12{18, April 2010.
  2. V Mahajan, M. Natu, and A. Sethi, \Analysis of wormhole intrusion attacks in manets," in IEEE Military Communications Conference (MILCOM 2008), San Diego, California, USA, pp. 1 {7, November 17-19, 2008.
  3. F Nait-Abdesselam, \Detecting and avoiding wormhole attacks in wireless ad hoc networks," IEEE Communications Magazine, vol. 46, pp. 127 {133, April 2008.
  4. Y-C. Hu, A. Perrig, and D. Johnson, \Packet leashes: a defense against wormhole attacks in wireless networks," in the 22nd Annual Joint Conference of the IEEE Com- puter and Communications (INFOCOM 2003), San Francisco, California, USA, vol.3, pp. 1976 { 1986, April 1-3, 2003.
  5. C. H. Vu and A. Soneye, \Collaborative Attacks on MANETs: An Analysis of Collaborative Attacks on Mobile Ad hoc Networks". LAP Lambert Academic Publishing, Germany, 2010.
  6. A Mtibaa and F. Kamoun, \Mmdv: Multipath and mpr based aodv routing protocol," in the IFIP 5th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net 2006), Lipari, Sicily, Italy, pp. 137{144, June 14-17, 2006.
  7. H Xu, X.Wu, H. Sadjadpour, and J. Garcia-Luna-Aceves, \A uni_ed analysis of routing protocols in manets," IEEE Transactions on Communications, vol. 58, pp. 911 {922, March 2010.
  8. N Meghanathan, \A manet multicast routing protocol for stable trees based on the inverse of link expiration times," in IEEE Consumer Communications and Networking Conference (CCNC 2012), Jackson, MS, USA, pp. 947 {951, January 14-17, 2012.
  9. I. Khalil, S. Bagchi, and N. Shro_, \Liteworp: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in International Conference on Dependable Systems and Networks (DSN 2005), West Lafayette, Indiana, USA, pp. 612 { 621, June 28 - July 1, 2005.
  10. A. Singh and K. Vaisla, \A mechanism for detecting wormhole attacks on wireless ad hoc network," International Journal of Computer Science and Network Security, vol. 2, pp. 27{31, September 2010.
  11. G. Mamatha and D. S. C. Sharma, \A Highly Secured Approach against Attacks in MANETS," International Journal of Computer Theory and Engineering, vol. 2, pp. 815{ 819, October 2010.
  12. S. Choi, D. young Kim, D.-H. Lee, and J.-I. Jung, \Wap: Wormhole attack prevention algorithm in mobile ad hoc networks," in Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC 2008), Taichung, Taiwan, pp. 343 {348, June 11-13, 2008.
  13. T. Hayajneh, P. Krishnamurthy, and D. Tipper, \Deworm: A simple protocol to detect wormhole attacks in wireless ad hoc networks," in Proceedings of the 3rd International Conference on Network and System Security (NSS 2009), Gold Coast, Queensland, Australia, pp. 73{80, October 19-21, 2009.
  14. Bhandare A.S., Patil S.B. and Patil B.S., Modified AODV Protocol To Prevent MANET Against Black Hole Attack And Its Performance Analysis, International Journal of Advanced Scientific and Technical Research, Issue 3 volume 4, July-August 2013
  15. Bhandare A.S., Patil S.B. and Patil B.S., Securing Manet Against Insider Attack-A Black Hole Attack & Its Performance Analysis, International Journal of Computer Application, Issue 3, Volume 4 (July-August 2013)

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
A. S. Bhandare, Prof. B. S. Patil, M. A. Khade, S. D. Patil, " Performance Analysis of Prevention of AODV-based Mobile AdHoc Networks under Cooperative Wormhole Attacks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.114-120, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183841