Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detection of Wormhole Attack in VANET


Affiliations
1 Kurukshetra University, Kurukshetra, India
2 E-Max Institute of Engineering, India
     

   Subscribe/Renew Journal


As security is one of the important issues in Vehicular Adhoc Networks (VANETs), it is required to deal with the threats related to them and one such severe threat is the wormhole attack in which the hacker node grabs the network traffic from one point and directs to another location that may drop the packets. In this paper, a scheme has been proposed which includes the RTT (Round Trip Time), usage level of links and count of neighbors to find the wormhole nodes in VANET. The proposed scheme is assessed and simulated against AODV protocol on NS-2 simulator. The efficiency of the nominated scheme is validated through simulation results.

Keywords

VANET, Wormhole Attack, Security, Detection.
Subscription Login to verify subscription
User
Notifications
Font Size


  • A. Singh and M. Singh, "A comprehensive review on vehicular ad hoc network," International Journal of Advanced Research in Computer and Communication Engineering, vol. 4, no. 4, pp. 462-468, 2015.
  • R.S. Raw, M. Kumar and N. Singh, "Security challenges, issues and their solutions for VANET," International journal of Network Security & Its Applications (IJNSA), vol. 5, no. 5, pp. 95-105, 2013.
  • A. Harikishan and P. Srinivasulu , "Intrusion detection system using fuzzy inference system," International Journal of Computer & Organization Trends, vol. 3, no. 8, pp. 345-352, 2013.
  • V. K. Upadhya and R. K. Shukla, "WPAODV: Wormhole Detection and Prevention Technique", International Journal of Advanced Networking and Applications, vol. 5, no. 3, p. 1922, 2013.
  • R. Karthiga and P. Suresh, "Optimization of Pattern Matching Algorithm for Network Intrusion detection System," International Journal of Advanced Research in Computer Science & Technology (IJARCST), vol. 2, no. 1, pp. 20-24, 2014.
  • A. Aggarwal and A. Saxena, "Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node Discovery", International Journal of Computer Science and Information Technologies(IJCSIT), vol. 5, no. 5, pp. 6620-6625, 2014.
  • C. Ting, "Detection system and the realization of the principle of BP neural network based intrusion," in 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), Nanchang, 2015.
  • S. Eidie, B. Akbari and P. Poshtiban, "WANI: Wormhole Avoidance using Neighbor Information", Information and Knowledge Technology (IKT), 2015 7th Conference on, pp. 1-6, 2015.
  • S. K. Arora and H. Monga, "Combined Approach for the Analysis of Black Hole and Worm Hole Attack in MANET", Indian Journal of Science and Technology, vol. 9, no. 20, 2016.
  • A. Radhika and D. Haritha, "Detection and Prevention of Blackhole Attack, Wormhole Attack in MANET Using ACO", International Journal of Engineering and Applied Sciences (IJEAS), vol. 3, no. 1, 2016.
  • E. Altman and T. Jimenez, "NS Simulator for beginners," in Lecture notes, France, 2003.

Abstract Views: 244

PDF Views: 2




  • Detection of Wormhole Attack in VANET

Abstract Views: 244  |  PDF Views: 2

Authors

Parteek Kumar
Kurukshetra University, Kurukshetra, India
Sahil Verma
E-Max Institute of Engineering, India
Kavita
E-Max Institute of Engineering, India

Abstract


As security is one of the important issues in Vehicular Adhoc Networks (VANETs), it is required to deal with the threats related to them and one such severe threat is the wormhole attack in which the hacker node grabs the network traffic from one point and directs to another location that may drop the packets. In this paper, a scheme has been proposed which includes the RTT (Round Trip Time), usage level of links and count of neighbors to find the wormhole nodes in VANET. The proposed scheme is assessed and simulated against AODV protocol on NS-2 simulator. The efficiency of the nominated scheme is validated through simulation results.

Keywords


VANET, Wormhole Attack, Security, Detection.

References