A Review Paper to Improve The Security of Mobile Ad HOC Networks For Energy-Saving System on Wormhole Detection and Prevention
Abstract
An overview of mobile ad hoc networks, security issues, and various attack types is provided in this study. Additionally, wormholes are linked by MANET as a serious thread that has been successfully separated from the network in question. Wormhole attacks are seen as a major risk to multi-hop ad hoc networks' security. Wormhole attacks include the attacker creating a tunnel from one network end to another, with nodes at either end assuming the role of genuine neighbors and gaining access to the discussion through the wormhole link. Worm hole attacks, in contrast to many other ad hoc routing attacks, cannot be stopped by cryptographic methods since hackers modify or generate new packages before they are discovered. This paper proposes a straightforward method for efficiently detecting wormhole attacks without the need for specialized hardware, location, or timing of the strict requirements. The suggested method offered a hybrid model that combined location-assisted route analysis with route redundancy using a graphical-based system. In order to identify whether a wormhole is present, this technique uses routing variation between neighbors. Simulations for various wormhole node distributions and connection models have been used to test the method.
Downloads
Metrics
References
Muhannad Tahboush and Mary Agoyi “A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)” in IEEE, Received December 28, 2020, accepted January 11, 2021, date of publication January 13, 2021, date of current version January 22, 2021. Digital Object Identifier 10.1109/ACCESS.2021.3051491, VOLUME 9, 2021.
Rajendra Prasad P, Shivashankar “Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network” Global Transitions Proceedings 3 (2022) 412–423, ScienceDirect. https://doi.org/10.1016/j.gltp.2021.10.001, journal homepage: http://www.keaipublishing.com/en/journals/global-transitions-proceedings/
Saad Al-Ahmadi “A Novel Energy-efficient Wormhole Attack Prevention Protocol for WSN based on Trust and Reputation Factors” ISBN: 978-989-758-551-7; ISSN: 2184-4380 DOI: 10.5220/0010951400003118, In Proceedings of the 11th International Conference on Sensor Networks (SENSORNETS 2022), pages 191-201.
Soo-Young Shin; Halim, E.H., "Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation," in ICTC, 2012 International Conference on , vol., no., pp.781-786, 15-17 Oct. 2012
Xiangyang Li, Wireless Ad Hoc and Sensor Networks: Theory and Applications, Cambridge University Press.
HimaniBathla, KanikaLakhani, “A Novel Method for Intrusion Detection System to Enhance Security in Ad hoc Network,” journal of computing, volume 2, issue 5, may 2010.
TiranuchAnantvalee, Jie Wu, a Survey on Intrusion Detection in Mobile Ad Hoc Networks.
Guang Gong, KatrinHoeper, Pre-Authentication and Authentication Models in Ad Hoc Networks.
Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense beside wormhole attacks in W networks,” in Proc. of IEEE INFOCOM, 2003.
P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc W networks,” in Proc. of CNDS, 2002.
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding- Royer, “A secure routing protocol for ad hoc networks,” in ProcOf IEEE ICNP, 2002.
L. Hl and lEvans, “Using directional antennas to avert wormhole attacks,” in Proc. of NDSS, 2004.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Md. Imran Ansari, Ashish Chourey

This work is licensed under a Creative Commons Attribution 4.0 International License.
IJOSCIENCE follows an Open Journal Access policy. Authors retain the copyright of the original work and grant the rights of publication to the publisher with the work simultaneously licensed under a Creative Commons CC BY License that allows others to distribute, remix, adapt, and build upon your work, even commercially, as long as they credit you for the original creation. Authors are permitted to post their work in institutional repositories, social media or other platforms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.