SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 656
A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN
WIRELESS NETWORK CODING SYSTEM
Ms. Nivethitha N, Mr. NandhaKumar S, Ms. Meenadevi M
Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India
Professor, Dept. of Comp.Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India
Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India
------------------------------------------------------------------------**********------------------------------------------------------------------------
Abstract - Wireless Network Coding System is the
promising approach to improve the performance of a
wireless network. It allows the forwarders to apply
encoding schee on what they receive, and they can create
and transmit new packets. The idea of mixing packets on
each node takes good advantages of the opportunity
diversity and broadcast nature of wireless
communications. However, wireless networks suffer from
a variety of problems such as packet drops, low
throughput and routing problems. The major threat in
wireless network is wormhole attack. The wormhole
attackers can severely disturbs the routing of a network
and sends the packet to the distant location. In existing
system, connectivity based graph analysis and Timing
Based algorithm are used to detect the wormhole attack.
These algorithms have difficulty in packet tracking and it
does not localize the attacker node in wireless network
coding system. Hence, it shows less efficiency in detecting
wormhole attack. In this paper, ETX (Expected
Transmission Count) is used to calculate the capacity of a
node and also the expected total number of transmissions
that are needed for a node to transmit the packet
successfully. The DAWN algorithm is based on the ETX to
detect and report the wormhole attack in wireless
network. For each node in the detect phase, it uses the ETX
metrics obtained by the node and based on that it detect
the attacker node exist in the network. In the report phase,
the DAWN algorithm forwards the report about an
attacker node that exists in the network to other node.
Key Words: Network Coding, DAWN, Expected
Transmission Count, Wormhole attack.
1. INTRODUCTION
Mobile computing is human–computer interaction by
which a computer is expected to be transported during
normal usage. Mobile computing involves mobile
communication, mobile hardware, and mobile software.
Communication issues include ad hoc and infrastructure
networks as well as communication properties, protocols,
data formats and concrete technologies. Providing
security services in the mobile computing environment is
challenging because it is more vulnerable for intrusion
and eavesdropping. The open nature of the wireless
medium makes it easy for outsiders to listen to network
traffic or interfere with it. Lack of centralized control
authority makes deployment of traditional centralized
security mechanisms difficult, if not impossible. Lack of
clear network entry points also makes it difficult to
implement perimeter-based defense mechanisms such as
firewalls. Finally, in a MANET nodes might be battery-
powered and might have very limited resources, which
may make the use of heavy-weight security solutions.
In the efforts to improve the system performance of
wireless networks, network coding has been shown to be
an effective and promising approach [1],[2] and it
constitutes a fundamentally different approach compared
to traditional networks, where intermediate nodes store
and forward packets as the original. In contrast, in
wireless network coding systems, the forwarders are
allowed to apply encoding schemes on what they receive,
and thus they create and transmit new packets. The idea
of mixing packets on each node takes good advantages of
the opportunity diversity and broadcast nature of wireless
communications, and significantly enhances system
performance. However, practical wireless network coding
systems face new challenges and attacks, whose impact
and countermeasures are still not well understood
because their underlying characteristics are different
from well-studied traditional wireless networks. The
wormhole attack is one of these attacks.
In a wormhole attack, the attacker can forward each
packet using wormhole links and without modifies the
packet transmission by routing it to an unauthorized
remote node. Hence, receiving the rebroadcast packets by
the attackers, some nodes will have the illusion that they
are close to the attacker actually no matter what
procedures are used, wormhole attacks severely imperil
network coding protocols [4], [5]. In particular, if
wormhole attacks are launched in routing, the nodes close
to attackers will receive more packets than they should
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 657
and be considered as having a good capability in help
forwarding packets. Thus they will be assigned with
more responsibility in packet forwarding than what they
can actually provide. Furthermore, other nodes will be
correspondingly contributing less. This unfair
distribution of workload will result in inefficient resource
utilization and reduce system performance.
Wormhole attacks launched during the data
transmission phase can also be very harmful. First,
wormhole attacks can be used as the first step towards
more sophisticated attacks, such as man-in-the middle
attacks and entropy attacks [3]. Second, the attackers can
periodically turn on and off the wormhole links in data
transmissions, confusing the system with fake link
condition changes and making it unnecessarily rerun the
routing process. With the ability of changing network
topologies and bypassing packets for further
manipulation, wormhole attackers pose a severe threat to
many functions in the network, such as routing and
localization.
The main objective of this paper is to detect and
localize wormhole attacks in wireless network coding
systems. A distributed algorithm, DAWN, to detect
wormhole attacks in wireless interflow network coding
systems. The main idea of the solutions is that by
examining the order of the nodes to receive the packets in
the network, and explore its relation with a widely used
metric, expected transmission count (ETX), associated
with each node [6], [7].
In DAWN, during regular data transmissions, each node
records the abnormal arrival of packets and shares this
information with its neighbours. DAWN has two phases
on each node: 1) Detect whether any attackers exist the
network and 2) Report attacker to the other node. Both of
the algorithms are running on every node in the network
[8]. In wireless network coding systems, where no fixed
routes exist, ETX, the expected number of the packets for
the source node to transmit so that the target node
(intermediate node or recipient) receives the packet,
provides a way to portray the topological structure of the
network and the relations among nodes.
2. SYSTEM MODEL
In this section we consider the existing system design
and the proposed system.
2.1 Existing System
The connectivity in the network is described using the
link loss probability value between each pair of nodes,
while traditional networks use connectivity graphs with
a binary relation (i.e., connected or not) on the set of
nodes. A graph theoretic framework for modeling
wormhole links was implemented and it derives the
necessary and sufficient conditions for detecting and
defending against the wormhole attacks. Based on this
framework, it shows that any candidate solution
preventing wormholes should construct a
communication graph that is a subgraph of the
geometric graph defined by the radio range of the
network nodes. Making use of this framework, a
cryptographic mechanism was proposed based on local
broadcast keys in order to prevent wormholes. This
solution does not need time synchronization or time
measurement, requires only a small fraction of the nodes
to know their location, and is decentralized. Hence, it is
suitable for networks with the most stringent
constraints such as sensor networks [9].
Some other existing works rely on the packet round
trip time difference introduced by wormhole attacks to
detect them [10]. Unfortunately, this type of solutions
cannot work with network coding. The fundamental
reason is that with network coding, the packets being
transmitted on each hop are different. They require
either to use an established route that does not exist with
network coding, or to calculate the delay between every
two neighbouring nodes which will introduce a huge
amount of error in network coding systems.
Problems Identified:
 They detect only the presence of a wormhole, but
do not provide the location of the attacker.
 It cannot find a solution to the dropping of the
data packet by the attacker node.
 The detections which rely on Connection based
detection leads to the false report when the
network changes.
2.2 Proposed System
The main objective of this paper is to detect and localize
wormhole attacks in wireless network coding systems. A
distributed algorithm, DAWN, to detect wormhole attacks
in wireless interflow network coding systems. The main
idea of the solutions is that examining the order of the
nodes to receive the packets in the network, and explore
its relation with a widely used metric, expected
transmission count (ETX), associated with each node. In
DAWN, during regular data transmissions, each node
records the abnormal arrival of packets and shares this
information with its neighbours. DAWN has two phases
on each node: Detect whether any attackers exist in the
network and in the report phase, the DAWN algorithm
forwards the report about an attacker node that exists in
the network to other node. The Detect phase is based on
the received results from the ETX. Both of the algorithms
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 658
are running on every node in the network. The DAWN
algorithm successfully detects and reports the wormhole
attack.
Fig -1 : Wormhole attacker detection
Benefits:
 DAWN algorithm successfully detects the
wormhole attacks and also localizes the malicious
node.
 Increases the reliability by continuous
monitoring of the network.
 DAWN is totally distributed for the node in the
network, eliminating the limitation of the tightly
synchronized clock.
 It provides the collusion resistance for legitimate
node against attacker nodes in the network.
3. DESIGN CONSTRUCTION
This section describes the modules to find the wormhole
attack in wireless network.
3.1 Neighbour List
A neighbour node is any node that falls within the
transmission range. The wireless network engages in a
neighbourhood discovery process. This gives each node’s
information about which node it can communicate
directly. In this, each node broadcast the neighbour
request NREQ message. The NREQ receiving node
responds to the neighbour with a neighbour reply
message (NREP). The requesting node constructs the
neighbour lists based on the received NREP messages
and counts its neighbour number to forward the packets.
After finding the neighbours, the sender node initiates the
route request to neighbour for finding the destination.
3.2 Route Finding
The sender selects the data which is to be transmitted and
convert them into packets. The forwarding decision is
generally made by using the routing process. In this
project, Dynamic Source Routing (DSR) algorithm is used
to establish a path between the source and destination.
Each node is responsible to construct the hierarchical
routing tree to other nodes in the network.
 When node S wants to send a packet to node D,
but does not know a route to D, node S initiates a
route discovery.
 Source node S floods Route Request (RREQ) to
the neighbour node and followed by other nodes
in the network till it finds the destination.
 Each node appends own identifier when
forwarding RREQ. Destination D on receiving the
first RREQ sends a Route Reply (RREP).
 RREP is sent on a route obtained by reversing
the route appended to receive RREQ.
 RREP includes the route from S to D on which
RREQ was received by node D.
 Node S on receiving RREP, caches the route
included in the RREP.
When node S sends a data packet to D, the entire route
is included in the packet header. Intermediate nodes use
the source route included in a packet to determine to
whom a packet should be forwarded. Routes maintained
only between nodes that need to communicate. Route
caching can further reduce route discovery overhead.
3.3 Expected Transmission Count
Expected Transmission Count is used to calculate the
total number transmission that a node should make in
order to make the other node to receive the packet
successfully. A node of low ETX means it is nearer to the
source and it may not be the wormhole attacker node. A
node of high ETX means it is difficult to make it heard
from the source, usually because the node is far from the
source or it may be the attacker node which leads the high
ETX values. Thus, the metric of the ETXs is a good
representation of the network structure.
ETX is also used to calculate the capacity of the
intermediate nodes in a network to check whether the
node has the capacity to forward the packet to the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 659
receiver node. It can be used as the first line of defense
for reducing the possibilities of wormhole attacks in the
network.
Fig -2 : ETX Results
3.4 Wormhole Attack Detection
It is needed to present the order of the nodes receiving
the packets in the network, and explore its relation with a
widely used metric, Expected Transmission Count (ETX),
associated with each node. DAWN (a Distributed
detection Algorithm against Wormhole in wireless
Network coding systems) is totally distributed for the
nodes in the network. DAWN is efficient and thus it fits
for wireless network. DAWN has two phases on each
node: detect wormhole attackers exist in the network and
report the attacker to the other node.
 For each node in the detect phase, it uses the ETX
metrics obtained by the node and based on that
it detect the attacker node exist in the network.
 In the report phase, the DAWN algorithm
forwards the report about an attacker node that
exists in the network to other node.
 Since any node can modify the report when
forwarding it, it is needed to apply cryptographic
techniques to protect the integrity of the reports.
Digital signatures are used to defend against
malicious modification of the report.
Fig -3 : Attacker Detection
ETX and DAWN algorithm can detect the malicious
nodes participating in wormhole attack with high
successful rate and the algorithm is efficient in terms of
computation and communication overhead.
4. PERFORMANCE EVALUATION
For each node, the detection algorithm will suspect that
one neighbor is an attacker if it receives packets from the
neighbor but the ETX of this neighbor is much higher
than that of itself. It sends its judgment as a report to its
neighbors. A node is called a judge node of a neighbor if
the difference between their ETXs is greater than the
threshold. We use digital signatures of the reports to
defend against malicious modification, and abstract of the
packet for administrative verification. It first examines
whether a report is from a valid judge node. If so, it will
forward the report unless it has already been forwarded
twice. The detection algorithm on each node accumulates
and calculates the number of its judge nodes who send
report about the reported potential attacker in the
current batch. If the number of judge nodes composes the
majority, the node will make the decision that the attacker
is involved in a wormhole attack.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 660
Fig -3 : Average throughput for source sending rate with
or without wormhole attack.
In order to examine the capability of DAWN in resisting
collusions among judge nodes, we test our algorithm in
the scenarios with different numbers of colluding judge
nodes. We observe the True Positive Rates with different
number of colluding nodes. It verifies that DAWN has
strong resistance against the colluding attacks.
For DAWN, Fig -5 shows the average computation time
cost per node and per batch with various node densities.
We can observe that our algorithm costs more time, when
there are more nodes in the network and
correspondingly more events to monitor and report.
Overall it shows the computation time cost of DAWN is
tolerable for most wireless network applications, with a
few milliseconds at most.
Fig -5 : Average time cost
5. CONCLUSION
Two algorithms, ETX and DAWN are proposed to
defend against wormhole attacks. Expected Transmission
Count is used to calculate the total number counts that a
node should make in order to make the other node to
receive the packet successfully. To examine the order of
the nodes which receive the packets in the network, and
explore its relation, expected transmission count (ETX),
associated with each node is used. ETX is also used to
calculate the capacity of the intermediate nodes in
network to check whether the node has the capacity to
forward the packet to the receiver node. In DAWN, during
regular data transmissions, each node records the
transmission of packets and shares this information with
its neighbours. DAWN algorithm successfully detects the
wormhole attacks and also localizes the malicious node. It
also forwards the attacker report to the other node in the
network. ETX and DAWN efficiently detect and localize
the wormhole attack in the networks. In the future work,
the attacker node can be avoided from participating in
packet transmission.
REFERENCES
[1] S. Li, R. Yeung, and N. Cai, “Linear network coding,”
IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371–381,
Feb. 2003.
[2] T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros,
J. Shi, and B. Leong, “A random linear network
coding approach to multicast,”IEEE Trans. Inf.
Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006.
[3] J. Newell, R. Curtmola, and C. Nita-Rotaru, “Entropy
attacks and countermeasures in wireless network
coding,” in Proc. 5th ACM Conf. Security Privacy
Wireless Mobile Netw., 2012, pp. 185–196.
[4] J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L.
Tong, “Timingbased localization of in-band
wormhole tunnels in MANETs,” in Proc. 3rd ACM
Conf. Wireless Netw. Security, 2010, pp. 1–12.
[5] S. R. D. R. Maheshwari, J. Gao, “Detecting wormhole
attacks in wireless networks using connectivity
information,” in Proc. IEEE 26th Int. Conf Commun.,
2007, pp. 107–115.
[6] S. Chachulski, M. Jennings, S. Katti, and D. Katabi,
“Trading structure for randomness in wireless
opportunistic routing,” in Proc. Conf. Appl.,
Technol., Archit. Protocols Comput. Commun., Aug.
2007, pp. 169–180.
[7] D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris,
“A high throughput path metric for multi-hop
wireless routing,” Wireless Netw., vol. 11, no. 4, pp.
419–434, 2005.
[8] Shiyu Ji, Tingting Chen, and Sheng Zhong,( 2015.)
“Wormhole Attack Detection Algorithms in
Wireless Network Coding Systems”, IEEE Trans.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 661
Mobile Computing, vol. 14, no.3, pp.660-674, Mar.
2015.
[9] R. Poovendran and L. Lazos, “A graph theoretic
framework for preventing the wormhole attack in
wireless ad hoc networks,” Wireless Netw., vol. 13,
no. 1, pp. 27–59, 2007.
[10] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet
leashes: A defense against wormhole attacks in
wireless networks,” in Proc. IEEE 23rd Annu. Joint
Conf. IEEE Comput. Commun., Mar. 2003, pp. 1976–
1986.

More Related Content

What's hot

Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSIJNSA Journal
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Rahul Kumar
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionDESHPANDE M
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksijdpsjournal
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNSIJCNC
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 

What's hot (19)

Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
NetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and DetectionNetSim Webinar on Network Attacks and Detection
NetSim Webinar on Network Attacks and Detection
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
C0363012014
C0363012014C0363012014
C0363012014
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Robust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networksRobust encryption algorithm based sht in wireless sensor networks
Robust encryption algorithm based sht in wireless sensor networks
 
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNSA NOVEL TWO-STAGE ALGORITHM PROTECTING  INTERNAL ATTACK FROM WSNS
A NOVEL TWO-STAGE ALGORITHM PROTECTING INTERNAL ATTACK FROM WSNS
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 

Similar to A Distributed Approach for Detecting Wormhole Attack in Wireless Network Coding System

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...IOSR Journals
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...IOSR Journals
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Alexander Decker
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 

Similar to A Distributed Approach for Detecting Wormhole Attack in Wireless Network Coding System (20)

Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Science journal
Science journalScience journal
Science journal
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
I1802046780
I1802046780I1802046780
I1802046780
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...DTADA: Distributed Trusted Agent Based Detection Approach  For Doline And Sen...
DTADA: Distributed Trusted Agent Based Detection Approach For Doline And Sen...
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
D0961927
D0961927D0961927
D0961927
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 

A Distributed Approach for Detecting Wormhole Attack in Wireless Network Coding System

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 656 A DISTRIBUTED APPROACH FOR DETECTING WORMHOLE ATTACK IN WIRELESS NETWORK CODING SYSTEM Ms. Nivethitha N, Mr. NandhaKumar S, Ms. Meenadevi M Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India Professor, Dept. of Comp.Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India Student, Dept. of Comp. Sci., Dhanalakshmi Srinivasan Engineering College,Tamilnadu,India ------------------------------------------------------------------------**********------------------------------------------------------------------------ Abstract - Wireless Network Coding System is the promising approach to improve the performance of a wireless network. It allows the forwarders to apply encoding schee on what they receive, and they can create and transmit new packets. The idea of mixing packets on each node takes good advantages of the opportunity diversity and broadcast nature of wireless communications. However, wireless networks suffer from a variety of problems such as packet drops, low throughput and routing problems. The major threat in wireless network is wormhole attack. The wormhole attackers can severely disturbs the routing of a network and sends the packet to the distant location. In existing system, connectivity based graph analysis and Timing Based algorithm are used to detect the wormhole attack. These algorithms have difficulty in packet tracking and it does not localize the attacker node in wireless network coding system. Hence, it shows less efficiency in detecting wormhole attack. In this paper, ETX (Expected Transmission Count) is used to calculate the capacity of a node and also the expected total number of transmissions that are needed for a node to transmit the packet successfully. The DAWN algorithm is based on the ETX to detect and report the wormhole attack in wireless network. For each node in the detect phase, it uses the ETX metrics obtained by the node and based on that it detect the attacker node exist in the network. In the report phase, the DAWN algorithm forwards the report about an attacker node that exists in the network to other node. Key Words: Network Coding, DAWN, Expected Transmission Count, Wormhole attack. 1. INTRODUCTION Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Providing security services in the mobile computing environment is challenging because it is more vulnerable for intrusion and eavesdropping. The open nature of the wireless medium makes it easy for outsiders to listen to network traffic or interfere with it. Lack of centralized control authority makes deployment of traditional centralized security mechanisms difficult, if not impossible. Lack of clear network entry points also makes it difficult to implement perimeter-based defense mechanisms such as firewalls. Finally, in a MANET nodes might be battery- powered and might have very limited resources, which may make the use of heavy-weight security solutions. In the efforts to improve the system performance of wireless networks, network coding has been shown to be an effective and promising approach [1],[2] and it constitutes a fundamentally different approach compared to traditional networks, where intermediate nodes store and forward packets as the original. In contrast, in wireless network coding systems, the forwarders are allowed to apply encoding schemes on what they receive, and thus they create and transmit new packets. The idea of mixing packets on each node takes good advantages of the opportunity diversity and broadcast nature of wireless communications, and significantly enhances system performance. However, practical wireless network coding systems face new challenges and attacks, whose impact and countermeasures are still not well understood because their underlying characteristics are different from well-studied traditional wireless networks. The wormhole attack is one of these attacks. In a wormhole attack, the attacker can forward each packet using wormhole links and without modifies the packet transmission by routing it to an unauthorized remote node. Hence, receiving the rebroadcast packets by the attackers, some nodes will have the illusion that they are close to the attacker actually no matter what procedures are used, wormhole attacks severely imperil network coding protocols [4], [5]. In particular, if wormhole attacks are launched in routing, the nodes close to attackers will receive more packets than they should
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 657 and be considered as having a good capability in help forwarding packets. Thus they will be assigned with more responsibility in packet forwarding than what they can actually provide. Furthermore, other nodes will be correspondingly contributing less. This unfair distribution of workload will result in inefficient resource utilization and reduce system performance. Wormhole attacks launched during the data transmission phase can also be very harmful. First, wormhole attacks can be used as the first step towards more sophisticated attacks, such as man-in-the middle attacks and entropy attacks [3]. Second, the attackers can periodically turn on and off the wormhole links in data transmissions, confusing the system with fake link condition changes and making it unnecessarily rerun the routing process. With the ability of changing network topologies and bypassing packets for further manipulation, wormhole attackers pose a severe threat to many functions in the network, such as routing and localization. The main objective of this paper is to detect and localize wormhole attacks in wireless network coding systems. A distributed algorithm, DAWN, to detect wormhole attacks in wireless interflow network coding systems. The main idea of the solutions is that by examining the order of the nodes to receive the packets in the network, and explore its relation with a widely used metric, expected transmission count (ETX), associated with each node [6], [7]. In DAWN, during regular data transmissions, each node records the abnormal arrival of packets and shares this information with its neighbours. DAWN has two phases on each node: 1) Detect whether any attackers exist the network and 2) Report attacker to the other node. Both of the algorithms are running on every node in the network [8]. In wireless network coding systems, where no fixed routes exist, ETX, the expected number of the packets for the source node to transmit so that the target node (intermediate node or recipient) receives the packet, provides a way to portray the topological structure of the network and the relations among nodes. 2. SYSTEM MODEL In this section we consider the existing system design and the proposed system. 2.1 Existing System The connectivity in the network is described using the link loss probability value between each pair of nodes, while traditional networks use connectivity graphs with a binary relation (i.e., connected or not) on the set of nodes. A graph theoretic framework for modeling wormhole links was implemented and it derives the necessary and sufficient conditions for detecting and defending against the wormhole attacks. Based on this framework, it shows that any candidate solution preventing wormholes should construct a communication graph that is a subgraph of the geometric graph defined by the radio range of the network nodes. Making use of this framework, a cryptographic mechanism was proposed based on local broadcast keys in order to prevent wormholes. This solution does not need time synchronization or time measurement, requires only a small fraction of the nodes to know their location, and is decentralized. Hence, it is suitable for networks with the most stringent constraints such as sensor networks [9]. Some other existing works rely on the packet round trip time difference introduced by wormhole attacks to detect them [10]. Unfortunately, this type of solutions cannot work with network coding. The fundamental reason is that with network coding, the packets being transmitted on each hop are different. They require either to use an established route that does not exist with network coding, or to calculate the delay between every two neighbouring nodes which will introduce a huge amount of error in network coding systems. Problems Identified:  They detect only the presence of a wormhole, but do not provide the location of the attacker.  It cannot find a solution to the dropping of the data packet by the attacker node.  The detections which rely on Connection based detection leads to the false report when the network changes. 2.2 Proposed System The main objective of this paper is to detect and localize wormhole attacks in wireless network coding systems. A distributed algorithm, DAWN, to detect wormhole attacks in wireless interflow network coding systems. The main idea of the solutions is that examining the order of the nodes to receive the packets in the network, and explore its relation with a widely used metric, expected transmission count (ETX), associated with each node. In DAWN, during regular data transmissions, each node records the abnormal arrival of packets and shares this information with its neighbours. DAWN has two phases on each node: Detect whether any attackers exist in the network and in the report phase, the DAWN algorithm forwards the report about an attacker node that exists in the network to other node. The Detect phase is based on the received results from the ETX. Both of the algorithms
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 658 are running on every node in the network. The DAWN algorithm successfully detects and reports the wormhole attack. Fig -1 : Wormhole attacker detection Benefits:  DAWN algorithm successfully detects the wormhole attacks and also localizes the malicious node.  Increases the reliability by continuous monitoring of the network.  DAWN is totally distributed for the node in the network, eliminating the limitation of the tightly synchronized clock.  It provides the collusion resistance for legitimate node against attacker nodes in the network. 3. DESIGN CONSTRUCTION This section describes the modules to find the wormhole attack in wireless network. 3.1 Neighbour List A neighbour node is any node that falls within the transmission range. The wireless network engages in a neighbourhood discovery process. This gives each node’s information about which node it can communicate directly. In this, each node broadcast the neighbour request NREQ message. The NREQ receiving node responds to the neighbour with a neighbour reply message (NREP). The requesting node constructs the neighbour lists based on the received NREP messages and counts its neighbour number to forward the packets. After finding the neighbours, the sender node initiates the route request to neighbour for finding the destination. 3.2 Route Finding The sender selects the data which is to be transmitted and convert them into packets. The forwarding decision is generally made by using the routing process. In this project, Dynamic Source Routing (DSR) algorithm is used to establish a path between the source and destination. Each node is responsible to construct the hierarchical routing tree to other nodes in the network.  When node S wants to send a packet to node D, but does not know a route to D, node S initiates a route discovery.  Source node S floods Route Request (RREQ) to the neighbour node and followed by other nodes in the network till it finds the destination.  Each node appends own identifier when forwarding RREQ. Destination D on receiving the first RREQ sends a Route Reply (RREP).  RREP is sent on a route obtained by reversing the route appended to receive RREQ.  RREP includes the route from S to D on which RREQ was received by node D.  Node S on receiving RREP, caches the route included in the RREP. When node S sends a data packet to D, the entire route is included in the packet header. Intermediate nodes use the source route included in a packet to determine to whom a packet should be forwarded. Routes maintained only between nodes that need to communicate. Route caching can further reduce route discovery overhead. 3.3 Expected Transmission Count Expected Transmission Count is used to calculate the total number transmission that a node should make in order to make the other node to receive the packet successfully. A node of low ETX means it is nearer to the source and it may not be the wormhole attacker node. A node of high ETX means it is difficult to make it heard from the source, usually because the node is far from the source or it may be the attacker node which leads the high ETX values. Thus, the metric of the ETXs is a good representation of the network structure. ETX is also used to calculate the capacity of the intermediate nodes in a network to check whether the node has the capacity to forward the packet to the
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 659 receiver node. It can be used as the first line of defense for reducing the possibilities of wormhole attacks in the network. Fig -2 : ETX Results 3.4 Wormhole Attack Detection It is needed to present the order of the nodes receiving the packets in the network, and explore its relation with a widely used metric, Expected Transmission Count (ETX), associated with each node. DAWN (a Distributed detection Algorithm against Wormhole in wireless Network coding systems) is totally distributed for the nodes in the network. DAWN is efficient and thus it fits for wireless network. DAWN has two phases on each node: detect wormhole attackers exist in the network and report the attacker to the other node.  For each node in the detect phase, it uses the ETX metrics obtained by the node and based on that it detect the attacker node exist in the network.  In the report phase, the DAWN algorithm forwards the report about an attacker node that exists in the network to other node.  Since any node can modify the report when forwarding it, it is needed to apply cryptographic techniques to protect the integrity of the reports. Digital signatures are used to defend against malicious modification of the report. Fig -3 : Attacker Detection ETX and DAWN algorithm can detect the malicious nodes participating in wormhole attack with high successful rate and the algorithm is efficient in terms of computation and communication overhead. 4. PERFORMANCE EVALUATION For each node, the detection algorithm will suspect that one neighbor is an attacker if it receives packets from the neighbor but the ETX of this neighbor is much higher than that of itself. It sends its judgment as a report to its neighbors. A node is called a judge node of a neighbor if the difference between their ETXs is greater than the threshold. We use digital signatures of the reports to defend against malicious modification, and abstract of the packet for administrative verification. It first examines whether a report is from a valid judge node. If so, it will forward the report unless it has already been forwarded twice. The detection algorithm on each node accumulates and calculates the number of its judge nodes who send report about the reported potential attacker in the current batch. If the number of judge nodes composes the majority, the node will make the decision that the attacker is involved in a wormhole attack.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 660 Fig -3 : Average throughput for source sending rate with or without wormhole attack. In order to examine the capability of DAWN in resisting collusions among judge nodes, we test our algorithm in the scenarios with different numbers of colluding judge nodes. We observe the True Positive Rates with different number of colluding nodes. It verifies that DAWN has strong resistance against the colluding attacks. For DAWN, Fig -5 shows the average computation time cost per node and per batch with various node densities. We can observe that our algorithm costs more time, when there are more nodes in the network and correspondingly more events to monitor and report. Overall it shows the computation time cost of DAWN is tolerable for most wireless network applications, with a few milliseconds at most. Fig -5 : Average time cost 5. CONCLUSION Two algorithms, ETX and DAWN are proposed to defend against wormhole attacks. Expected Transmission Count is used to calculate the total number counts that a node should make in order to make the other node to receive the packet successfully. To examine the order of the nodes which receive the packets in the network, and explore its relation, expected transmission count (ETX), associated with each node is used. ETX is also used to calculate the capacity of the intermediate nodes in network to check whether the node has the capacity to forward the packet to the receiver node. In DAWN, during regular data transmissions, each node records the transmission of packets and shares this information with its neighbours. DAWN algorithm successfully detects the wormhole attacks and also localizes the malicious node. It also forwards the attacker report to the other node in the network. ETX and DAWN efficiently detect and localize the wormhole attack in the networks. In the future work, the attacker node can be avoided from participating in packet transmission. REFERENCES [1] S. Li, R. Yeung, and N. Cai, “Linear network coding,” IEEE Trans. Inf. Theory, vol. 49, no. 2, pp. 371–381, Feb. 2003. [2] T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B. Leong, “A random linear network coding approach to multicast,”IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413–4430, Oct. 2006. [3] J. Newell, R. Curtmola, and C. Nita-Rotaru, “Entropy attacks and countermeasures in wireless network coding,” in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 185–196. [4] J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L. Tong, “Timingbased localization of in-band wormhole tunnels in MANETs,” in Proc. 3rd ACM Conf. Wireless Netw. Security, 2010, pp. 1–12. [5] S. R. D. R. Maheshwari, J. Gao, “Detecting wormhole attacks in wireless networks using connectivity information,” in Proc. IEEE 26th Int. Conf Commun., 2007, pp. 107–115. [6] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading structure for randomness in wireless opportunistic routing,” in Proc. Conf. Appl., Technol., Archit. Protocols Comput. Commun., Aug. 2007, pp. 169–180. [7] D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high throughput path metric for multi-hop wireless routing,” Wireless Netw., vol. 11, no. 4, pp. 419–434, 2005. [8] Shiyu Ji, Tingting Chen, and Sheng Zhong,( 2015.) “Wormhole Attack Detection Algorithms in Wireless Network Coding Systems”, IEEE Trans.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 661 Mobile Computing, vol. 14, no.3, pp.660-674, Mar. 2015. [9] R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Netw., vol. 13, no. 1, pp. 27–59, 2007. [10] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE 23rd Annu. Joint Conf. IEEE Comput. Commun., Mar. 2003, pp. 1976– 1986.