SlideShare a Scribd company logo
BMWA: A Novel Model for Behavior mapping for
Wormhole Adversary Node in MANET
Presented by:
Ms. S. B. Geetha
2/8/2024
1
Contents
• Introduction
• Literature Survey
• Proposed methodology
• Algorithm
• Results
• Conclusion
• References
Introduction
• Security problems in mobile adhoc network is always
represented as a challenging problems owing to it inherent
characteristics i.e. dynamic topology, intermittent link
breakage, power consumption etc.
• Wormhole attack is one the most lethal attack among the
various other types of security vulnerabilities in mobile adhoc
networks.
Wormhole attack
Literature Survey
• [5] have presented a technique to countermeasure the adverse effect of
wormhole attack over on-demand routing in MANET using case study of
misbehaved nodes. The study outcome shows enhanced communication
performance.
• Almost similar direction of study towards wormhole attack was also carried
out by Kaur and Chaba [6] to find the technique offer lower delay and
throughput.
• Gupta and Pathak [7] have introduced a technique that explores substitute
route for avoiding the packets go in wormhole tunnel. The study outcome
shows reduced overhead in routing, reduced packet drop, and increased
received packets.
Literature Survey
• Stoleru et al. [8] have presented a technique that emphasizes on the
discovery of the neighbor nodes for secured communication system in
MANET. The technique also assists in determining the wormhole node
position and explores the neighbor node in much secured manner.
• Shastri and Joshi [9] have reviewed the existing techniques towards
determining and eradicating the wormhole adversaries in MANET.
• Similar forms of identifying and localizing wormhole attacks were also
carried out by Ojha and Kushwah [10]. The technique has also used
threshold-based approach for improving delay and communication
performance.
• Ali and Nand [11] have presented a discussion where two different on-
demand routing protocols were investigated in presence of wormhole
attack on MANET. In a nutshell, it can be said that there are few
techniques to resists the adverse effect of wormhole attacks in MANET
Literature Survey
• The existing technique has emphasized on detection of the adversaries and
presented approaches to identify the tunnel. All the above mentioned
technique has associated advantages as well as pitfalls too
Proposed Methodology
Algorithm for BMWA
• Input: A, n, m
• Output: adversary
• Start
• 1. init A, n, m
• 2. [Rns, Mns] = [ρ1, ρ2, ρ3]
• 3. If Tθ*(1-Tu)<T
• 4. If Tθ<val1
• 5. flag strategy DF
• 6. else
• 7. flag strategy PD
• 8. end
• 9. End
• 10. compute α1, α2, α3
• 11. Pcatch = si*((temp1-Damf)/statf)
• 12. Flag n(max(card(α3)) adversary
• End
Results
Results
Results
Conclusion
This paper presents a probabilistic technique that assists in
formulating a decision by a regular node to determine if its
neighbor or its other communication node is wormhole adversary.
Proper identification of wormhole adversary will protect the
regular node from wormhole tunnel. Our outcome shows that
proposed system offer a better balance between malicious node
identification with communication performance in MANET
References
• [1]R. Rajendran, A Survey on Multicast Routing Protocol and
Its Challenges in Manet, Lap Lambert Academic Publishing,
2015
• [2] S. Paul, Introduction to MANET and Clustering in
MANET, Anchor Academic Publishing-Computer, 2016
• [3] A. Nadeem and M. P. Howarth, "A Survey of MANET
Intrusion Detection & Prevention Approaches for Network
Layer Attacks," in IEEE Communications Surveys & Tutorials,
vol. 15, no. 4, pp. 2027-2045, Fourth Quarter 2013.
• [4] S. Das and P. Nand, "Survey of hash security on DSR
routing protocol," 2016 International Conference on
Computing, Communication and Automation (ICCCA), Noida,
2016, pp. 520-524
References
• [5]Y. Singh, A. Khatkar, P. Rani, and D.D. Barak, “Wormhole Attack Avoidance Technique in Mobile
Adhoc Networks”, In Advanced Computing and Communication Technologies (ACCT), Third
International Conference, pp. 283-287, 2013.
• [6]G. Kaur, V. K. Jain, and Y. Chaba, "Wormhole attacks: Performance evaluation of on demand
routing protocols in Mobile Adhoc networks", In Information and Communication Technologies
(WICT), 2011 World Congress, pp. 1155-1158, 2011.
• [7]C. Gupta, and P. Pathak, "Movement based or neighbor based tehnique for preventing wormhole
attack in MANET”, In Colossal Data Analysis and Networking (CDAN), Symposium, pp. 1-5, 2016.
• [8]R. Stoleru,H.Wu, and H. Chenji, “Secure neighbor discovery and wormhole localization in mobile
ad hoc networks”, Ad Hoc Networks, Vol. 10, No. 7, pp. 1179-1190, 2012
• [9]A. Shastri and J. Joshi, “A Wormhole Attack in Mobile Ad-hoc Network: Detection and
Prevention”, In Proceedings of the Second International Conference on Information and
Communication Technology for Competitive Strategies, pp. 31, 2016
• [10]M. Ojha and R.S.Kushwah, “Improving Quality of Service of trust based system against
wormhole attack by multi-path routing method”, In Soft Computing Techniques and
Implementations (ICSCTI), 2015 International Conference, pp. 33-38, 2015
• [11]S. Ali and P. Nand, “Comparative performance analysis of AODV and DSR routing protocols
under wormhole attack in mobile ad hoc network on different node's speeds”, In Computing,
Communication and Automation (ICCCA), 2016 International Conference, (pp. 641-644, 2016
Thank you

More Related Content

PPTX
Wormhole attack in Mobile Ad hoc NetworkET.pptx
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PPTX
Wormhole attack
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
Ijcatr04051009
PDF
Dj4301653656
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
Wormhole attack in Mobile Ad hoc NetworkET.pptx
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Wormhole attack
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
Ijcatr04051009
Dj4301653656
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...

Similar to Wormhole attack in Mobile Adhoc Networks (20)

PDF
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PDF
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
PDF
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
PDF
Link Reliability based Detection and Predecessor base Route Establishment for...
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
PDF
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
PDF
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
PDF
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
PDF
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
PDF
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
PDF
Wormhole attack mitigation in manet a
PDF
E0432933
PDF
Injection of Attacks in MANETs
PDF
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
PDF
Wormhole Attack
PDF
Perusal of Intrusion Detection and Prevention System on a MANET, with Black H...
PDF
IMAGE GENERATION FROM CAPTION
PDF
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
Link Reliability based Detection and Predecessor base Route Establishment for...
Elimination of wormhole attacker node in manet using performance evaluation m...
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
MLDW- A MultiLayered Detection mechanism for Wormhole attack in AODV based MANET
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
Wormhole attack mitigation in manet a
E0432933
Injection of Attacks in MANETs
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
Wormhole Attack
Perusal of Intrusion Detection and Prevention System on a MANET, with Black H...
IMAGE GENERATION FROM CAPTION
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
Ad

Recently uploaded (20)

PDF
737-MAX_SRG.pdf student reference guides
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPT
Occupational Health and Safety Management System
PPTX
introduction to high performance computing
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PPTX
Current and future trends in Computer Vision.pptx
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Fundamentals of Mechanical Engineering.pptx
PPT
introduction to datamining and warehousing
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PDF
Soil Improvement Techniques Note - Rabbi
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
737-MAX_SRG.pdf student reference guides
UNIT 4 Total Quality Management .pptx
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Occupational Health and Safety Management System
introduction to high performance computing
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Current and future trends in Computer Vision.pptx
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Fundamentals of Mechanical Engineering.pptx
introduction to datamining and warehousing
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
Information Storage and Retrieval Techniques Unit III
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
Soil Improvement Techniques Note - Rabbi
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
86236642-Electric-Loco-Shed.pdf jfkduklg
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Ad

Wormhole attack in Mobile Adhoc Networks

  • 1. BMWA: A Novel Model for Behavior mapping for Wormhole Adversary Node in MANET Presented by: Ms. S. B. Geetha 2/8/2024 1
  • 2. Contents • Introduction • Literature Survey • Proposed methodology • Algorithm • Results • Conclusion • References
  • 3. Introduction • Security problems in mobile adhoc network is always represented as a challenging problems owing to it inherent characteristics i.e. dynamic topology, intermittent link breakage, power consumption etc. • Wormhole attack is one the most lethal attack among the various other types of security vulnerabilities in mobile adhoc networks.
  • 5. Literature Survey • [5] have presented a technique to countermeasure the adverse effect of wormhole attack over on-demand routing in MANET using case study of misbehaved nodes. The study outcome shows enhanced communication performance. • Almost similar direction of study towards wormhole attack was also carried out by Kaur and Chaba [6] to find the technique offer lower delay and throughput. • Gupta and Pathak [7] have introduced a technique that explores substitute route for avoiding the packets go in wormhole tunnel. The study outcome shows reduced overhead in routing, reduced packet drop, and increased received packets.
  • 6. Literature Survey • Stoleru et al. [8] have presented a technique that emphasizes on the discovery of the neighbor nodes for secured communication system in MANET. The technique also assists in determining the wormhole node position and explores the neighbor node in much secured manner. • Shastri and Joshi [9] have reviewed the existing techniques towards determining and eradicating the wormhole adversaries in MANET. • Similar forms of identifying and localizing wormhole attacks were also carried out by Ojha and Kushwah [10]. The technique has also used threshold-based approach for improving delay and communication performance. • Ali and Nand [11] have presented a discussion where two different on- demand routing protocols were investigated in presence of wormhole attack on MANET. In a nutshell, it can be said that there are few techniques to resists the adverse effect of wormhole attacks in MANET
  • 7. Literature Survey • The existing technique has emphasized on detection of the adversaries and presented approaches to identify the tunnel. All the above mentioned technique has associated advantages as well as pitfalls too
  • 9. Algorithm for BMWA • Input: A, n, m • Output: adversary • Start • 1. init A, n, m • 2. [Rns, Mns] = [ρ1, ρ2, ρ3] • 3. If Tθ*(1-Tu)<T • 4. If Tθ<val1 • 5. flag strategy DF • 6. else • 7. flag strategy PD • 8. end • 9. End • 10. compute α1, α2, α3 • 11. Pcatch = si*((temp1-Damf)/statf) • 12. Flag n(max(card(α3)) adversary • End
  • 13. Conclusion This paper presents a probabilistic technique that assists in formulating a decision by a regular node to determine if its neighbor or its other communication node is wormhole adversary. Proper identification of wormhole adversary will protect the regular node from wormhole tunnel. Our outcome shows that proposed system offer a better balance between malicious node identification with communication performance in MANET
  • 14. References • [1]R. Rajendran, A Survey on Multicast Routing Protocol and Its Challenges in Manet, Lap Lambert Academic Publishing, 2015 • [2] S. Paul, Introduction to MANET and Clustering in MANET, Anchor Academic Publishing-Computer, 2016 • [3] A. Nadeem and M. P. Howarth, "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks," in IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2027-2045, Fourth Quarter 2013. • [4] S. Das and P. Nand, "Survey of hash security on DSR routing protocol," 2016 International Conference on Computing, Communication and Automation (ICCCA), Noida, 2016, pp. 520-524
  • 15. References • [5]Y. Singh, A. Khatkar, P. Rani, and D.D. Barak, “Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”, In Advanced Computing and Communication Technologies (ACCT), Third International Conference, pp. 283-287, 2013. • [6]G. Kaur, V. K. Jain, and Y. Chaba, "Wormhole attacks: Performance evaluation of on demand routing protocols in Mobile Adhoc networks", In Information and Communication Technologies (WICT), 2011 World Congress, pp. 1155-1158, 2011. • [7]C. Gupta, and P. Pathak, "Movement based or neighbor based tehnique for preventing wormhole attack in MANET”, In Colossal Data Analysis and Networking (CDAN), Symposium, pp. 1-5, 2016. • [8]R. Stoleru,H.Wu, and H. Chenji, “Secure neighbor discovery and wormhole localization in mobile ad hoc networks”, Ad Hoc Networks, Vol. 10, No. 7, pp. 1179-1190, 2012 • [9]A. Shastri and J. Joshi, “A Wormhole Attack in Mobile Ad-hoc Network: Detection and Prevention”, In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 31, 2016 • [10]M. Ojha and R.S.Kushwah, “Improving Quality of Service of trust based system against wormhole attack by multi-path routing method”, In Soft Computing Techniques and Implementations (ICSCTI), 2015 International Conference, pp. 33-38, 2015 • [11]S. Ali and P. Nand, “Comparative performance analysis of AODV and DSR routing protocols under wormhole attack in mobile ad hoc network on different node's speeds”, In Computing, Communication and Automation (ICCCA), 2016 International Conference, (pp. 641-644, 2016