Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time

Authors

  • K. Karthigadevi Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India
  • S. Balamurali Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India
  • M. Venkatesulu Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

DOI:

https://doi.org/10.13052/2245-1439.7115

Keywords:

WSN, Wormhole attack, RTT, EIGRP, Intruder node

Abstract

One of the major harmful attacks in wireless sensor network is wormhole attack. These attacks are disturbing the routing in networks and create a large amount of traffics. Wormhole attacks are target to the banks, government, private sectors, public sectors etc. The proposed method is used to analyse and detect the wormhole attack. Using EIGRPprotocol to identify the shortest path and detect the attacking node based on the round trip time variation technique. As compared with previous method, it is the easy way to detect the wormhole attacks.

 

Downloads

Download data is not yet available.

Author Biographies

K. Karthigadevi, Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

K. Karthigadevi received her Undergraduate degree in Computer Applications from Madurai Kamaraj University, Madurai, India, in 2004 and the post graduate degree in Computer Applications from Anna University, Chennai, India, in 2007. She worked as a faculty member at Arulmigu Kalasalingam College of Arts and Science from 2007 to 2009. Currently she is working as an Assistant Professor in the Department of Computer Applications at Kalasalingam Academy of Research and Education, Krishnankoil,Srivilliputtur, Tamilnadu, India from 2009 to till now. Her current research area is network security.

S. Balamurali, Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

S. Balamurali is a Professor of Statistics and Director of Computer Applications at the Kalasalingam Academy of Research and Education. He received his undergraduate, postgraduate and doctoral degrees in Statistics from Bharathiar University, India. His research interests include applied statistics, data mining, network security and bioinformatics.

M. Venkatesulu, Department of Information Technology, Kalasalingam Academy of Research and Education, Krishnankoil 626 126, Tamilnadu, India

M. Venkatesulu received the postgraduate degree in Mathematics fromSri Venkateswara University, Tirupati, India, in 1975, and the Ph.D. degree in mathematics from Indian Institute of Technology, Kanpur, India, in 1979. He worked as a faculty member at Shri Sathya Sai University,Prashanthinilayam, India between 1983 and 2003. He also worked as a consultant for Satyam Computers, Hyderabad, India, for a short period. He was a Visiting Professor at University of Missouri, Kansas City, between August 2006 and May 2007. Currently he is working as a Senior Professor and Head of the Department of Information Technology at Kalasalingam University, Krishnankovil, Srivilliputtur, Tamil Nadu, and India. His area of interest includes differential equation, Image Processing, Cryptography, Bioinformatics, Big Data Analytics and Distributed Computing.

References

Ronghui, H., Guoqing, M., Chunlei, W., and Lan, F. (2009). Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes. World Academy of Science, Engineering and Technology, 55(31), 10–15.

Chen, H., Lou, W., Sun, X., and Wang, Z. (2009). A secure localization approach against wormhole attacks using distance consistency. EURASIP Journal on Wireless Communications and Networking, 2010(1), 627039.

Chen, H., Lou, W., and Wang, Z. (2009). Conflicting-set-based wormhole attack resistant localization in wireless sensor networks. In International Conference on Ubiquitous Intelligence and Computing (pp. 296–309). Springer, Berlin, Heidelberg.

Lazos, L., and Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM workshop on Wireless security (pp. 21–30). ACM.

García-Otero, M., and Población-Hernández, A. (2012). Detection of wormhole attacks in wireless sensor networks using range-free localization. In 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), (pp. 21–25). IEEE.

Buttyán, L., Dóra, L., and Vajda, I. (2005). Statistical wormhole detection in sensor networks. In European Workshop on Security in Ad-hoc and Sensor Networks (pp. 128–141). Springer, Berlin, Heidelberg.

Song, N., Qian, L., and Li, X. (2005). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In 2005. Proceedings. 19th IEEE international Parallel and distributed processing symposium, (pp. 8–pp). IEEE.

Chiu, H. S., and Lui, K. S. (2006). DelPHI: wormhole detection mechanism for ad hoc wireless networks. In 2006 1st international symposium on Wireless pervasive computing, (pp. 6–pp). IEEE.

Sharif, M., Azeem, A., and Haider, M. R. W. (2012). A Novel Wormhole Detection Technique for Wireless Ad Hoc Networks. International Journal of Advanced Networking and Applications, 3(5), 1298.

Jen, S. M., Laih, C. S., and Kuo, W. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6),5022–5039.

Prakash, R. A., Jeyaseelan, W. S., and Jayasankar, T. (2018). Detection, Prevention and Mitigation of Wormhole Attack in Wireless Adhoc Network by Coordinator. Appl. Math, 12(1), 233–237.

Kaur, P., Kaur, D., and Mahajan, R. (2017). Wormhole Attack Detection Technique in Mobile Ad Hoc Networks. Wireless Personal Communications, 97(2), 2939–2950.

Jain, A., Sharma, S., and Buksh, B. Detection and Prevention of Wormhole Attack in Wireless Sensor Network. International Journal of Application or Innovation in Engineering & Management,pp. 138–142.

Lai, G. H. (2016). Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP Journal on Wireless Communications and Networking, 2016(1), 274.

Jain, R., Gupta, R., Rashmi, and Sandhya Katiyar. (2017). Detection and Prevention of Wormhole Attack In Adhoc Network Using Aodv Protocol. International Journal of Computer Science and Mobile Computing, pp. 241–248.

Ji, S., Chen, T., and Zhong, S. (2015). Wormhole attack detection algorithms in wireless network coding systems. IEEE transactions on mobile computing, 14(3), 660–674.

Patel, M. M., and Aggarwal, A. (2016). Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbourhood and Connectivity Information, International Journal on AdHoc Networking Systems, pp. 1–10.

Bendjima, M., and Feham, M. (2016). Wormhole attack detection in wireless sensor networks. In SAI Computing Conference (SAI), 2016 (pp. 1319–1326). IEEE.

Nivedha, S., and Narayanan, S. S. (2015). Detection and prevention of wormhole attack in MANET using new fresh algorithm. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 4(5), 2321–2326.

Shrivastava, A., and Dubey, R. (2015). Wormhole attack in mobile ad-hoc network: a survey. International Journal of Security and Its Applications, 9(7), 293–298.

Karthigadevi, K., Balamurali, S., and Venkatesulu, M. (2017). Improving Quality of Service, In Wireless Sensor Networks Using Neighbor Constraint Transmission Centric Distributed Sink Hole Detection And Network Simulator 2”, ARPN Journal of Engineering and Applied Sciences, pp. 1197–1201.

Downloads

Published

2018-01-11

How to Cite

1.
Karthigadevi K, Balamurali S, Venkatesulu M. Wormhole Attack Detection and Prevention Using EIGRP Protocol Based on Round Trip Time. JCSANDM [Internet]. 2018 Jan. 11 [cited 2024 Nov. 22];7(1-2):215-28. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5297

Issue

Section

Articles