Detection of Wormhole Attacks using AODV: A Proposed Scheme
Moumita Pramanik1, Samarjeet Borah2, Diksha Giri3
1Moumita Pramanik, Department of Computer Applications, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Gangtok (Sikkim), India.
2Samarjeet Borah, Department of Computer Applications, Sikkim Manipal Institute of Technology, Sikkim Manipal University, Gangtok (Sikkim), India.
3Diksha Giri, Department of Computer Science, Inspiria Knowledge Campus, Siliguri (West Bengal), India.
Manuscript received on 18 June 2019 | Revised Manuscript received on 25 June 2019 | Manuscript published on 30 June 2019 | PP: 566-572 | Volume-8 Issue-5, June 2019 | Retrieval Number: E7149068519/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Sensor Networks (WSN) are often vulnerable to several types of attacks due to its open space deployment and large area of applications. Wormhole is one of such attack, which falls under the category of Denial of Service (DoS). In this attack, an attacker takes control of the network services by developing an overlay tunnel called wormhole channel. In this paper, a mechanism has been proposed by appending extra four-bit information to RREP packets which is known to both sender and receiver; thus, reducing chances of wormhole tunnel. The work is based on AODV protocol and simulated in OMNeT, which effectively detect illegitimate attack carriers.
Keywords: Wireless Sensor Network, Energy, AODV, DoS, Wormhole Attack, Detection
Scope of the Article: WSN