Investigating the Impact of Network Parameters on Wormhole Attack with ANODR Routing Protocol in MANET

Uppe Nanaji*, S. Pallam Setty **
*-** Department of Computer Science and Software Engineering, Andhra University, Visakhapatnam, Andhra Pradesh, India.
Periodicity:January - June'2020
DOI : https://doi.org/10.26634/jwcn.8.4.17611

Abstract

The MANET is a network which can organize the mobile ad hoc network nodes dynamically with temporary and arbitrary topologies. This MANET offers many applications in current communication technology. The security and privacy in MANET is a major challenging issue as wireless communication is more vulnerable to security attacks. In this network the individual node operates like transmitter, receiver and router. Moreover, due to openness of the network, there are more chances for malicious users to enter into the network which creates an illusion. So that the individual node understands the data, even if it is sensed from original sender, malicious sender and receiver node behavior. Hence the malicious users create more data loss. So, these wormhole attacks creates network related issues and degrade the MANET efficiency. Major research is now concentrated on the behavior which makes the normal node to act as wormhole to degrade the network performance. In this paper, several parameters are studied and some parameters makes a node to become a wormhole. Experiments are conducted using popular network simulator – “Qualnet Simulator”. The results clearly show the impact of wormhole on the performance of MANETs.

Keywords

MANET, Security, Wormhole Attack, Qualnet, ANODR, Performance.

How to Cite this Article?

Nanaji, U., and Setty, S. P. (2020). Investigating the Impact of Network Parameters on Wormhole Attack with ANODR Routing Protocol in MANET. i-manager’s Journal on Wireless Communication Networks , 8(4), 1-6. https://doi.org/10.26634/jwcn.8.4.17611

References

[1]. Ahuja, R., Ahuja, A. B., & Ahuja, P. (2013, December). Performance evaluation and comparison of AODV and DSR routing protocols in MANETs under wormhole attack. In 2013, IEEE Second International Conference on Image Information Processing (ICIIP-2013) (pp. 699-702). IEEE. https://doi.org/10.1109/ICIIP.2013.6707686
[2]. Alani, M. M. (2014, November). MANET security: A survey. In 2014, IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014) (pp. 559-564). IEEE. https://doi.org/10.1109/ICCSCE.2014.7072 781
[3]. As'adi, H., Haddad, A., Jamshidi, A. (2018). A new statistical method for wormhole attack detection in th MANETs. In 2018, 15 International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). https://doi.org/10.1109/ISCISC.2018. 8546943
[4]. Cabrera, A. T., Mozos, A. G., & Casilari, E. (2010, September). On the suitability of using the residual lifetime as a routing metric in manets. In Telecommunications: The st Infrastructure for the 21 Century (pp. 1-6).
[5]. Douceur, J. R. (2002). The Sybil attack. In Proceedings st of the 1 International Workshop on Peer-to-Peer Systems (IPTPS'02) (pp. 251-260).
[6]. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003a, March). Packet leashes: A defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003 Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (Vol. 3, pp. 1976-1986). IEEE.
[7]. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003b, September). Rushing attacks and defense in wireless ad nd hoc network routing protocols. In Proceedings of the 2 ACM workshop on Wireless security (pp. 30-40).
[8]. Jha, H. N., Gupta, S., & Maity, D. (2020). Effect of wormhole attacks on MANET. In Design Frameworks for Wireless Networks (pp. 177-195). Singapore: Springer. https://doi.org/10.1007/978-981-13-9574-1
[9]. Joshi, P. (2011). Security issues in routing protocols in MANETs at network layer. Procedia Computer Science, 3, 954-960. https://doi.org/10.1016/j.procs.2010.12.156
[10]. Karlsson, J., Dooley, L. S., Pulkkis, G. (2011). A new MANET wormhole detection algorithm based on traversal time and hop count analysis. International Journal of Sensors, 11(12), 11122-11140. https://doi.org/10.3390/s11 1211122
[11]. Kong, J., & Hong, X. (2003, June). ANODR: Anonymous on demand routing with untraceable routes th for mobile ad-hoc networks. In Proceedings of the 4 ACM International Symposium on Mobile Ad-Hoc Networking & Computing (pp. 291-302). https://doi.org/10.1145/7784 15.778449
[12]. Rai, A., RanjanTewari, R., & Upadhyay, S. K. (2010). Different types of attacks on integrated MANET-internet communication. International Journal of Computer Science and Security (IJCSS), 4(3), 265-274.
[13]. Sarkar, D., Choudhury, S., & Majumder, A. (2018). Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. Journal of King Saud University-Computer and Information Sciences, 1–25. https://doi.org/10.1016/j. jksuci.2018.08.013
[14]. Xiao, H., Ibrahim, D. M., & Christianson, B. (2014, April). Energy consumption in mobile ad hoc networks. In 2014, IEEE Wireless Communications and Networking Conference (WCNC) (pp. 2599-2604). IEEE. https://doi. org/10.1109/WCNC.2014.6952818
[15]. Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47. https://doi.org/10.1109/MWC.2004.1269716
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.