An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack
Journal Title: Mehran University Research Journal of Engineering and Technology - Year 2016, Vol 35, Issue 3
Abstract
MANETs (Mobile Ad Hoc Networks) are slowly integrating into our everyday lives, their most prominent uses are visible in the disaster and war struck areas where physical infrastructure is almost impossible or very hard to build. MANETs like other networks are facing the threat of malicious users and their activities. A number of attacks have been identified but the most severe of them is the wormhole attack which has the ability to succeed even in case of encrypted traffic and secure networks. Once wormhole is launched successfully, the severity increases by the fact that attackers can launch other attacks too. This paper presents a comprehensive algorithm for the detection of exposed as well as hidden wormhole attack while keeping the detection rate to maximum and at the same reducing false alarms. The algorithm does not require any extra hardware, time synchronization or any special type of nodes. The architecture consists of the combination of Routing Table, RTT (Round Trip Time) and RSSI (Received Signal Strength Indicator) for comprehensive detection of wormhole attack. The proposed technique is robust, light weight, has low resource requirements and provides real-time detection against the wormhole attack. Simulation results show that the algorithm is able to provide a higher detection rate, packet delivery ratio, negligible false alarms and is also better in terms of Ease of Implementation, Detection Accuracy/ Speed and processing overhead.
Authors and Affiliations
Zubair Ahmed Khan, Saeed-Ur- Rehman, Muhammad Hasan Islam
Cross-Term Suppression in Time Order Distribution for AWGN Signal
A technique of cross-term suppression in WD (Wigner Distribution) for a multi-component signal that is embedded WGN (White Gaussian Noise) is proposed. In this technique, an optimized algorithm is developed for time-vary...
Design and Co-Simulation of Depth Estimation Using Simulink HDL Coder and Modelsim
In this paper a novel VHDL design procedure of depth estimation algorithm using HDL (Hardware Description Language) Coder is presented. A framework is developed that takes depth estimation algorithm described in MATLAB a...
Assessment of Air Pollution and its Effects on Health of Workers of Steel Re-Rolling Mills in Hyderabad
The SRRMs (Steel Re-Rolling Mills) are being releasing air pollutants in the environment. In order to evaluate their effect on the health of the workers, health and safety issues were analyzed by first measuring the conc...
Evaluation of Mesh of Liberation of Zard Koh and Kulli Koh Iron Ores of Pakistan
Liberation size plays a significant role to select a correct and successful concentration method for natural iron ores. This paper aims to evaluate the liberation size of two newly discovered iron ores, namely Zard Koh a...
Assessing the Impacts of Climate Change on Future Precipitation Trends Based on Downscaled CMIP5 Simulations Data
This study investigates future changes in precipitation over the CRB (Columbia River Basin) in both wet (DJF) and dry (JJA) seasons under RCP85 GHG emission scenario. The simulations from four climate models which partic...