An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

Abstract

MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

Authors and Affiliations

Zubair Ahmed Khan, Saeed-Ur- Rehman, Muhammad Hasan Islam

Keywords

Related Articles

Enabling the Usability Heuristics of Agile Base Systems to Improve Quality of Local Software Industry

Many agile software development practices are promoted to improve the quality of software products. In recent years agile software development overlooked the usability features that effected system productivity.Usability...

Apneic Events Detection Using Different Features of Airflow Signals

Apneic-event based sleep disorders are very common and affect greatly the daily life of people. However, diagnosis of these disorders by detecting apneic events are very difficult. Studies show that analyzes of airflow s...

Analysis of Wind Energy Potential and Optimum Wind Blade Design for Jamshoro Wind Corridor

Pakistan is facing energy crisis since last decade. This crisis can be effectively handled by utilizing alternative energy resources. Pakistan has a huge wind energy potential of about 50,000MW. The contribution of costa...

Just-in-Time Compilation-Inspired Methodology for Parallelization of Compute Intensive Java Code

Compute intensive programs generally consume significant fraction of execution time in a small amount of repetitive code. Such repetitive code is commonly known as hotspot code. We observed that compute intensive hotspot...

Governance of Clean Energy in Rural Northwest Pakistan

Effective institutional arrangements at local and national levels are important for promotion of renewable energy in a country. The present study attempts to examine the institutional arrangements for development of dome...

Download PDF file
  • EP ID EP184336
  • DOI -
  • Views 130
  • Downloads 0

How To Cite

Zubair Ahmed Khan, Saeed-Ur- Rehman, Muhammad Hasan Islam (2016). An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack. Mehran University Research Journal of Engineering and Technology, 35(3), 359-372. https://europub.co.uk/articles/-A-184336