An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

Abstract

MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.

Authors and Affiliations

Zubair Ahmed Khan, Saeed-Ur- Rehman, Muhammad Hasan Islam

Keywords

Related Articles

Volt/VAr Optimization of Distribution System with Integrated Distributed Generation

This paper addresses the issues of VVO (Volt/VAr Optimization) such as loss minimization, acceptable voltage profiles and optimized number of switching operations. Basic function of the DMS (Distribution Management Syste...

Phase and Micro-Structural Characterization of Sanitary-Ware Fired at Different Temperature

The three main ingredients of sanitary-ware are clay, feldspar and quartz. This ware is being widely used and has therefore, attracted the attention of researchers from time to time. Consequently, it has been extensively...

Blind's Eye: Employing Google Directions API for Outdoor Navigation of Visually Impaired Pedestrians

Vision plays a paramount role in our everyday life and assists human in almost every walk of life. The people lacking vision sense require assistance to move freely. The inability of unassisted navigation and orientation...

A Survey of Semantic Computing: General and Islamic Domain Applications

Semantic searching has already received a substantial amount of interest as a way to search specific contents on the web. The development of ontologies has proven their worth in providing interesting solutions to knowled...

A Family of 2n-Point Ternary Non-Stationary Interpolating Subdivision Scheme

This article offers 2n-point ternary non-stationary interpolating subdivision schemes, with the tension parameter, by using Lagrange identities. By choosing the suitable value of tension parameter, we can get different l...

Download PDF file
  • EP ID EP184336
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

Zubair Ahmed Khan, Saeed-Ur- Rehman, Muhammad Hasan Islam (2016). An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack. Mehran University Research Journal of Engineering and Technology, 35(3), 359-372. https://europub.co.uk/articles/-A-184336