ArticlePDF Available

A Hybrid Approach to Modified AODV Protocol to Detect and Avoid Wormhole Effected Path over MANET

Authors:

Abstract and Figures

In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. MANET encounter by number of security threat because of its open untrusted environment with little security arrangement, whether security over MANET is not to be enhance up to satisfactory level because of its characteristics. Among all of security threat worm hole is consider to be a very serious security threat over MANET. In worm hole two selfish node which is geographically very far away to each other, makes tunnel between each other to hide their actual location and try to believe that they are true neighbours and makes conversation through the wormhole tunnel. Recently research will focus over wormhole detection and avoiding path but existing technique having lower network overhead, lower battery power consumption in order to longer survival of network with fast response. This paper introduce a modified AODV protocol that detect and avoid wormhole path over MANET towards secure routing , which is based on an hybrid model that encapsulate location, neighbor node and hop count method.
Content may be subject to copyright.
International Journal of Computer Applications (0975 8887)
Volume 90 No 6, March 2014
1
A Hybrid Approach to Modified AODV Protocol to Detect
and Avoid Wormhole Effected Path over MANET
Neha Sahu
Department of Computer Science
and Engineering,
Technocrats Institute of Technology,
Bhopal
Deepak Singh Tomar
Department of Computer Science
and Engineering,
Technocrats Institute of Technology,
Bhopal
Neelam Pathak
Department of Computer Science
and Engineering,
Technocrats Institute of Technology,
Bhopal
ABSTRACT
In MANET mobile node is responsible for route establishment
using wireless link where each node behave like both as a host
and router. MANET encounter by number of security threat
because of its open untrusted environment with little security
arrangement, whether security over MANET is not to be
enhance up to satisfactory level because of its characteristics.
Among all of security threat worm hole is consider to be a very
serious security threat over MANET. In worm hole two selfish
node which is geographically very far away to each other, makes
tunnel between each other to hide their actual location and try to
believe that they are true neighbours and makes conversation
through the wormhole tunnel. Recently research will focus over
wormhole detection and avoiding path but existing technique
having lower network overhead, lower battery power
consumption in order to longer survival of network with fast
response. This paper introduce a modified AODV protocol that
detect and avoid wormhole path over MANET towards secure
routing , which is based on an hybrid model that encapsulate
location, neighbor node and hop count method.
Keywords
Ad-hoc network, wormhole, threshold, AODV
1. INTRODUCTION
The rapid growth of communication system the researchers pay
attention to wireless communication approach. In this way the
mobile ad-hoc network is one the best solution where
communication takes place without any wired media.
Mobile ad-hoc network is a type of ad-hoc network which is
created temporally. In these types of network the nodes have the
special properties. This network has created with the wireless
equipments. The major advantage of this network is- it is
infrastructure less, it can be self-deploy and it doesn’t need a
centralized authority [1].along with that there are many
important characteristic needs for the mobile node. Some of
them discussed below:
The node should be Wireless
Hardware of the node should be consumption Low power
The ability to route the packet
No need of central co-ordinator
Range of the node should be satisfactory
Mobility of the node should be needed
Node installation should be easy
A node can be self healed
Auto sleep mode
The node should support the older protocols until extremely
necessity of developing new protocols not occur.
It is not necessary that all these properties should be the node of
mobile ad-hoc network. But up to a certain extend these
properties are needed in the mobile node.
As far as the connecting media is concert, it is different from
wired network so that, there is a need to use the different
protocols to manage the network. Protocols designs for Mobile
ad-hoc network are different from the protocols used in wired
networks. Some time it seems to be that there protocol stuck in
getting the correct decision because of the attacks.
The wormhole attack is a serious threat for mobile ad-hoc
network that happen in the routing protocol for distracting the
user for sending their data and it cannot be detected easily. Its
present a illusion of shortest path between two end points in
network. For detection of the wormhole attack in MANET a
technique has been proposed. The wormhole puts the attacker
nodes in a very powerful position compared to other nodes in the
network. In the reactive routing protocols such as AODV, the
attackers can tunnel each route request packets to another
attacker that is near to destination node [3, 4]. When the
neighbours of the destination hear this RREQ, they will
rebroadcast this RREQ and then discard all other received
RREQs in the same route discovery process.
Routing protocol over the dynamic link of MANET is
responsible to select shortest and less traffic path but it is very
challenging because of its mobile nodes and its very tedious job
to maintain the accuracy over the network for long time
.wormhole attacker node can use that greediness of shortest path,
make a tunnel over the network and present an illusion of
shortest path via wormhole node.
2. WORM HOLE ATTACK
As earlier we have discussed that wormhole is types of attack
which is worked on the network layer [6, 7]. It creates the tunnel
in order to forward the data from one wormhole node to another
wormhole node. So it also confirms that there is a need of two
nodes. Figure 4 shows the simple scenario of the wormhole. In
this figure there are two networks having number of nodes. In
both network two nodes act as wormhole node. Node N6 and
P11 are the nodes with a tunnel in network 1 and network 2.
Both nodes show that they have the shortest path to get the
destination node in the different network. It might possible that
both nodes can exist in the same network. It depends on the
wormhole creator.
International Journal of Computer Applications (0975 8887)
Volume 90 No 6, March 2014
2
Figure 1: Illustration of a Wormhole attack
3. RELATED WORK
Maria A. Et al [8] has analysed on the wormhole attack and with
respect to proactive protocols. The authors pay attention to the
network traffic. The author tried to found the anomalous
behaviour of nodes using timing analysis of routing traffic
within the network. The proposed approach is far better than the
previous approaches.
The proposed work [9] has developed the novel protocol in order
to prevent the wormhole attack in the wireless environment. The
author has used the symmetric and asymmetric key cryptography
with Global positioning system. The protocol has tested on the
both GPS node and non GPS node. The author has tested the
protocol with the ratios of GPS nodes to non-GPS nodes 30:20,
25:25, and 20:30, 15:35, 10:40 and 5:45 under a total network
area of 100 by 100 meters. This gives the higher results.
The author [11] has proposed a protocol which doesn’t uses any
special hardware like directional antenna or synchronized clock.
This protocol doesn’t depend on the physical medium of the
wireless network. In this approach the wormhole detection will
take place after the discovery of route. Here the hope count
techniques have also used between neighbours. The author has
also applied the hound packet. The simulation results show that
the WHOP is quite excellent in detecting wormhole of large
tunnel lengths.
The wormhole is a major problem in mobile ad-hoc network.
For the best result there are many protocols has developed. The
two famous protocols are AODV and DSR. This paper gives the
comparison result between these protocols. The parameter
considered by the author are: packet delivery fraction, the
average end-to-end delay, average jitter, throughput, number of
frames tunneled, number of frames intercepted, number of
frames dropped, number of frames replayed etc. the results
shows that AODV is perfect protocol for the small network. Due
to the routing overhead of AODV the performance will decrease
in large network. But As the length of colluding link increases,
the performance for DSR degrades compared to AODV.
The proposed methodology is based on the route request
(RREQ). To find the wormhole in the network the author has
suggested finding the possible routes by using the RREQ. There
are three basic steps has used in this approach. These are routes
redundancy, routes aggregation and calculating round-trip time
(RTT) of all listed routes. The proposed results have compared
with the AODV protocol and the previous approaches for the
time based calculation. The parameter of packets dropping has
decreased in this approach.
4. PROPOSED SOLUTION
This paper presents a hybrid approach that select an wormhole
free path from source to destination. Proposed scheme work over
the selection criteria of path reply from neighbor node, actually
whenever any node S wants transmit a packet to D then its
required a path for message transmission where routing
algorithm (AODV) suggest a path for transmission such as node
S broadcast a route request packet to all its neighbor or radio
node for route towards destination D .All the neighbor node
follow up the request forwards and replay an route replay packet
to source node, then source node select shortest and less traffic
path for transmission but because of that greediness some time
source node select wormhole effected path for transmission.
Proposed protocol hybrid approach enhances the performance of
AODV by adding one more rule over selection criteria ie select
wormhole free route.
Proposed protocol use location, hop count and neighbors node
concept for wormhole detection in the routing path suggested by
AODV. In proposed methodology every hops over the route
responsible to find out, is there any worm hole between its next
hop to its next to next hop over the route. For detection every
hop evaluate an alternate route for their next to next hop over the
route and if number of hop count in any of alternate route is
greater than MHC(maximum hop count value) than that node
reply wormhole detection signal between its next hop and its
next to next hop and discard that path .
󰇛󰇜



󰇛󰇜

 = Route suggested by AODV from source to
destination
 
Where, =Source node
=Destination node
󰇛󰇜
 = Max TTL time/node in route R.
(Intermediate node)

 = Nbj is the neighbor node of node ni
Algo
Step 1:- Source node(s) call AODV protocol for route request
towards destination D.
Step:2- AODV reply route reply packet with following message

Step3:-
For (i=0; i n-1; i++)
International Journal of Computer Applications (0975 8887)
Volume 90 No 6, March 2014
3
For (j=0; j m; j++)

TTL(
 )
If (TTL (
 )MHC)
Wormhole deduction message display and route discarded.
In proposed methodology the main consternation over the MHC
value because all decision will carry out on the basis of that
value. MHC means maximum number of hop count with any
alternate route between any nodes to its neighbor of neighbor
nodes ie any nodes to its second stage node. Where as if an
routing protocol return an path S,A,B,G,H,D ie s is source and d
is destination then node B must be neighbor of neighbor node of
S via A and so on. But if B is not next to next node then
alternate path defiantly return hop value greater than MHC
value.
For calculating MHC each and every node of network find the
largest number of hop count required for its next to next node
with any alternate route over the network. And consider average
of its as MHC value
Algorithm for MHC

HC=Hop count
N = total number of node in network
X = number of neighbor node
MHC=Maximum hop count
Algorithm
For (I=1; I<=N ; I++)
{
For (J=1; J<=X ; J++)
{
Step 1. Si send an route request message to all its neighbor
node for its next to next node NNjSi
Step 2. All the neighbor node reply the Route through route
Reply packet to Si in term of number of hop count
‘Y’
Step 3. if (Y>HC)
HC=Y
}
MHC= MHC+ HC
}
MHC = MHC/N
5. SIMULATION AND RESULT
ANALYSIS
In order to authenticate the proposed methodology for wormhole
detection verity of simulation experiments have been performed
by using NS-2
For performance validation of proposed technique take different
numbers of nodes in each scenario and consider a wormhole
tunnels between any two nodes of that scenario for the
simulation test. For experimental verification proposed
technique run over three different scenarios with 140,160,180
and 200 node densities with same assumptions. As show in
figure 1 false negative rate ie rate of wormhole detection is
depend network density whereas MHC that is considered as
keyhole for wormhole detection also depends on the network
density.
Time Taken to Detect the Wormhole
Wormhole detection is perform by any node in between their
next node and next to next node,whether this section describe
time required to generate wormhole detection signal by any node
successfully.
Figure 2: Time taken to detect wormhole
As show in figure 2 times required to detect wormhole by hybrid
approach is significantly very less as compare to E2SIW. The
average time taken to detect a wormhole by the E2SIW is 790
mili second, whereas it is 560 mili second in the case of hybrid
approach.
Battery Power Consumption
E2SIW use GPS system for gathering the location of node ie
used 1 joule of energy per node to gather it location whereas
there is not any requirement of GPS system in hybrid approach.
One joule energy is 33% of energy used per node in E2SIW so
proposed hybrid approach degrades the energy requirement by
33%.
Network Overhead
With consider the algorithm 2 for MHC proposed technique is
compared with the existing E2SIW in many different factors like
network overhead and number for control packet responsible for
route hunting and handshaking over different node of network.
Proposed technique decrease the possibility of packet
International Journal of Computer Applications (0975 8887)
Volume 90 No 6, March 2014
4
retransmission so ultimately decrease the routing overhead as
show in figure 4. Along with that proposed technique used
number of control packet for wormhole verification over each
node so proposed technique having larger number of control
packet as compare to AODV.
Figure 3: Comparison between Proposed hybrid approach
and E2SIW over Handshaking
The above observation shows that the detection technique works
efficiently but having some overhead, control packet is also
increases in the graph, but the benefit of this technique is that it
detects the wormhole, and will serve as an advantage when
added to the existing AODV protocol.
6. CONCLUSIONS
In this paper a hybrid methodology for detecting and avoiding
wormhole affected path in mobile ad hoc network is presented.
This method encapsulate advantage of two different predefine
method in order to overcome their limitation. The performance
of proposed technique is depending upon network density,
having lower response time with lower power consumption.
In order to detect wormhole proposed technique use larger
number of control packet in future we will try negotiates that
effect.
7. ACKNOWLEDGEMENT
I would like to say thanks to my guide prof Deepak Singh Tomar
and prof Neelam Pathak who gives their knowledge and time in
order to complete this paper. This paper will never complete
without the support facility member CSE department TIT
Bhopal.
8. REFERENCES
[1] Maulik, R. ; Chaki, N., "A comprehensive review on
wormhole attacks in MANET" IEEE 2010, Page 233-238.
[2] Jian Yin, Sanjay Madria, "A hierarchical secure routing
protocol against black hole attack in sensor networks",
IEEE SUTC, 2006.
[3] Xiangyang Li “Wireless Ad Hoc and Sensor Networks:
Theory and Applications” Cambridge University Press 978-
0-521-86523-4
[4] Sebastian Terence J , "Secure Route Discovery against
Wormhole Attack in Sensor Networks using Mobile
Agents", IEEE 2011, pp 110-115.
[5] C. Perkins, E. Belding-Royer, “Ad hoc On-Demand
Distance Vector (AODV) Routing,” The Internet Society
2003.
[6] Sang-min Lee, Keecheon Kim “An Effective Path
Recovery Mechanism for AODV Using Candidate Node”
springerlink, vol. 4331/2006, 2006.
[7] Mahajan, V. ; Natu, M. ; Sethi, A. , "Analysis of wormhole
intrusion attacks in MANETS", IEEE 2008, Page 1-7.
[8] Keer, S. ; Suryavanshi, A., "To prevent wormhole attacks
using wireless protocol in MANET" IEEE 2010, Page 159-
163.
[9] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M.
Belding- Royer, “A secure routing protocol for ad hoc
networks,” in Proc. of IEEE ICNP, 2002.
[10] Dang Quan Nguyen ; Lamont, L., "A Simple and Efficient
Detection of Wormhole Attacks", IEEE 2008, Page 1-5.
[11] Katrin Hoeper, Guang Gong, “Pre-Authentication and
Authentication Models in Ad Hoc Networks,” Signals and
Communication Technology, pp. 65-82, 2007.
[12] Kanika Lakhani, Himani bathla, Rajesh Yadav “A
Simulation Model to Secure the Routing Protocol AODV
against Black-Hole Attack in MANET” IJCSNS
International Journal of Computer Science and Network
Security, vol. 10 No.5, May 2010.
IJCATM : www.ijcaonline.org
ResearchGate has not been able to resolve any citations for this publication.
Conference Paper
Full-text available
As MANETs use wireless medium for communication, these are vulnerable to many security attacks. In this paper a comprehensive review is done on the very recent state of the art research results on wormhole attacks and relevant mitigation measures. 100% of the works reviewed here are published in last five years, out of which 80% are published in last three years. The simulation results in NS2 helps to quantify the comparative performances of the different solutions proposed.
Book
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon reliable sensor networks. The book is divided into five sections: design and modeling, network management, data management, security, and applications. The eighteen self-contained chapters are authored by experts in wireless networking. Each chapter is given expository but also scholarly treatment, covering the history of its specific topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest. Key Features: *Explores different access control protocols and wake up strategies in wireless sensor networks; *Discusses several time-synchronization techniques and challenges, i.e., directed diffusion, tiny aggression, greedy aggression on directed diffusion; *Provides insights in network security, i.e., secure routing, and proper management; *Elaborates on numerous wireless sensor network applications, i.e., the ExScal application and the XSM platform. The topics covered within this book are intended for researchers, computer engineers, applied mathematicians, and graduate students interested in wireless sensor networks, but uninformed readers may also find this volume stimulating and helpful.
Conference Paper
Wireless sensor networks have many potential areas of applications. Wormhole attack is one of attack in sensor network. For wormhole attack, the attackers need not to compromise any sensor nodes, where as attacker receives packet at one location tunnels them to another location. Later, the attacker can tamper the data, messages, or selectively forward data messages to disrupt the functions of the sensor network. It place attacker in very powerful position relative to other nodes in network. This paper discusses Secure Routing protocol against Wormhole Attacks in sensor network (SeRWA). SeRWA provides secure route with false positive. We use mobile agent to reduce false positive in SeRWA protocol. The literature survey has been done on various techniques used to defense against wormhole attack, advantages and disadvantages of each also studied. Researchers have used some special hardware such as the directional antenna and the precise synchronized clock to defend the network against wormhole attacks.
Article
The increasing popularity and usage of wireless technology is creating a need for more secure wireless networks. Wireless networks are particularly vulnerable to a powerful attack known as the wormhole attack. An attacker records packets at one location in the network and tunnels them to another location. Routing can be disrupted when routing control messages are tunneled. This tunnel between two colluding attackers is referred as a wormhole. Wormhole attacks are severe threats to MANET routing protocols. For example, when a wormhole attack is used against an on-demand routing protocol such as DSR or AODV, the attack could prevent the discovery of any routes other than through the wormhole. This project designed and developed a new protocol that prevents wormhole attacks on wireless networks. The design of this protocol is based on the use of asymmetric and symmetric key cryptography and a Global Positioning System (GPS). It was evaluated using simulations under realistic ad-hoc network settings. The simulations identified the strengths and weaknesses of this protocol under different distributions of GPS and non-GPS nodes, network areas and network structures. Within a set of requirements and assumptions, this wireless security protocol can detect nearly half of wormhole attacks by relying on each node's relative location.
Chapter
Providing entity authentication and authenticated key exchange among nodes are both target objectives in securing ad hoc networks. In this chapter, a security framework for authentication and authenticated key exchange in ad hoc networks is introduced. The framework is applicable to general ad hoc networks and formalizes network phases, protocol stages, and design goals. To cope with the diversity of ad hoc networks, many configuration parameters that are crucial to the security of ad hoc networks are discussed. Special attention is paid to the initial exchange of keys between pairs of nodes (pre-authentication) and the availability of a trusted third party in the network. Next, several pre-authentication and authentication models for ad hoc networks are discussed. The models can be implemented as a part of the proposed security framework and correspond to the wide range of ad hoc network applications. Advantages and disadvantages of the models are analyzed and suitable existing authentication and key exchange protocols are identified for each model.
Conference Paper
Wormhole refers to an attack on MANET routing protocols in which colluding nodes create an illusion that two remote regions of a MANET are directly connected through nodes that appear to be neighbors but are actually distant from one another. Our focus in this paper is a particular form of the wormhole attack called the self-contained in-band wormhole. In this paper we analyze the criterion for successful wormhole attack on a MANET. Based on results collected from a Qualnet simulation, we evaluate the likelihood of such an attack. We further classify the wormhole scenarios into successful, unsuccessful, doubtful, interesting, and uninteresting. We also define wormhole strength and observe that the detection ratio of the technique proposed in varies with wormhole strength as well as with the network topology. The simulation statistics also show that the wormholes having higher strength have a higher detection ratio as compared to the ones with lower strength.
Conference Paper
Wormhole attacks in mobile ad hoc networks (MANET) have long been considered a serious threat to MANET's routing. Most of the existing proposals rely on GPS devices and require that the node's clocks are synchronized. Such constraints naturally lead to limitations of applicability since GPS does not operate well in obstructed areas, and clock synchronization in MANET is not always accurate. In this paper, we propose an efficient and simple way to detect wormhole attacks, using a technique called reference broadcast. GPS devices are not required, and clocks do not need to be synchronized. In fact, no particular assumption is made on the communication equipment. We show that our solution can be easily implemented, using either the well-known routing protocol OLSR or any neighbor discovery protocol. Our solution also exhibits a high degree of accuracy in detecting wormhole attacks.
Article
A wormhole attack is particularly harmful against routing in sensor networks where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. A wormhole attack can be easily launched by an attacker without compromising any sensor nodes. Since most of the routing protocols do not have mechanisms to defend the network against wormhole attacks, the route request can be tunneled to the target area by the attacker through wormholes. Thus, the sensor nodes in the target area build the route through the attacker. Later, the attacker can tamper the data, messages, or selectively forward data messages to disrupt the functions of the sensor network. Researchers have used some special hardware such as the directional antenna and the precise synchronized clock to defend the sensor network against wormhole attacks during the neighbor discovery process. In this paper, we propose a Secure Routing protocol against wormhole attacks in sensor networks (SeRWA). SeRWA protocol avoids using any special hardware such as the directional antenna and the precise synchronized clock to detect a wormhole. Moreover, it provides a real secure route against the wormhole attack. Simulation results show that SeRWA protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than 10%). The average energy usage at each node for SeRWA protocol during the neighbor discovery and route discovery is below 25 mJ, which is much lower than the available energy (15 kJ) at each node. The cost analysis shows that SeRWA protocol only needs small memory usage at each node (below 14 kB if each node has 20 neighbors), which is suitable for the sensor network.