A SOLUTION TO DETECT AND PREVENT WORMHOLE ATTACKS IN MOBILE AD HOC NETWORK
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/33/1/8914Keywords:
AODV, DWAODV, MANET, VRTM, mobile ad hoc network, network security.Abstract
Wormhole attack is one of varied types of Denial-of-Service attacks in Mobile Ad hoc Network. For purpose of attack, the attackers use the two malicious nodes connected with each other by a tunnel that is aimed at eavesdropping or damaging the data packet. Previous researches aiming at securing against the wormhole attacks was published, typical as detection algorithms based on Round Trip Time or Packet Traversal Time, or hop-count based analysis. They have the detection effectiveness is mitigated on the network topology with high mobility nodes, and depends on tunnel length. This article proposes a Valid Route Testing Mechanism (VRTM) and integration of VRTM into AODV protocol to make DWAODV which is able to detect and prevent the wormhole attacks. Using Network Simulator (NS2), we evaluate the security effectiveness of DWAODV protocol on random movement network topology at high speed. The simulation results shows that our solution is capable of detecting successfully over 99% of invalid routes, and small depend on tunnel length. In addition, in the normal network topology, the routing performance of DWAODV is approximately as AODV based on the metrics including the average length of each discovered routing path, packet delivery ratio, network throughput and routing load.Metrics
Metrics Loading ...
Downloads
Published
07-11-2017
How to Cite
[1]
V. T. Tu and L. T. Ngoc, “A SOLUTION TO DETECT AND PREVENT WORMHOLE ATTACKS IN MOBILE AD HOC NETWORK”, JCC, vol. 33, no. 1, p. 34–49, Nov. 2017.
Issue
Section
Computer Science
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.