Open Access Open Access  Restricted Access Subscription Access

A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks


Affiliations
1 Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
 

In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbour detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending the route reply. The route reply contains the number of routes that lead to it, sending and receiving time, the identification of intermediate nodes and the request that the sender had sent. During analyzing the reply, sender confirms the number of routes by sending packets of verification to individual nodes whose identification has been stated by the receiver and based upon the delay in time i.e., Δt, wormhole link is detected. Analysis proves that the proposed technique not only detects the wormhole link but also provides a verification mechanism to judge the validity of nodes.

Keywords

Wormhole, Ad Hoc Networks, Intrusion, Packets.
User
Notifications
Font Size

Abstract Views: 169

PDF Views: 0




  • A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks

Abstract Views: 169  |  PDF Views: 0

Authors

Muhammad Sharif
Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
Aisha Azeem
Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
Mudassar Raza
Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, Pakistan
Waqas Haider
Department of Computer Science, COMSATS Institute of Information Technology, Wah Cantt, Pakistan

Abstract


In this paper a wormhole detection technique has been proposed which makes use of AODV as an on demand routing protocol and secure neighbour detection protocol with certain modifications. In the technique, sender floods the route request packets in search of destination and in return the receiver responds by sending the route reply. The route reply contains the number of routes that lead to it, sending and receiving time, the identification of intermediate nodes and the request that the sender had sent. During analyzing the reply, sender confirms the number of routes by sending packets of verification to individual nodes whose identification has been stated by the receiver and based upon the delay in time i.e., Δt, wormhole link is detected. Analysis proves that the proposed technique not only detects the wormhole link but also provides a verification mechanism to judge the validity of nodes.

Keywords


Wormhole, Ad Hoc Networks, Intrusion, Packets.