Abstract
The cooperative nature and absence of infrastructure gives rise to lot of scope for research in the area of Mobile Ad-hoc Networks (MANETs). The dynamic topology, absence of central control and broadcast nature of communication open security threats for MANETs. Many security attacks have been identified by the researchers, but wormhole attack is one of the most devastating attacks. Novel Transmission Time based Mechanism (NTTM) detects wormhole attacks by keeping every node under the surveillance of its neighbors. Based on the Round Trip Time (RTT) computed by each node on a route, the source node computes RTT between each neighbor. If the RTT between a pair of nodes is more than the threshold value, it is assumed that there is wormhole attack between these nodes. The performance of NTTM is evaluated using dynamic source routing (DSR) protocol under wormhole attack.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Su, M.Y.: WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile Ad-hoc networks. Int. J. of Computer and Security 29, 208–224 (2010)
Taheri, M., Naderi, M., Barekatain, M.B.: New Approach for detection and defending the Wormhole Attacks in Wireless Ad Hoc Networks. In: Proc. 18th ICEE, Iran, pp. 331–335 (2010)
Van Tran, P., Canh, N.T., Lee, Y.-K., Lee, S.: Transmission Time-based Mechanism to Detect Wormhole Attacks. In: Proc. of IEEE 2nd Asia-Pacific Services Computing Conference, Seoul, pp. 172–178 (2007)
Chiu, H.S., Lui, K.S.: DELPHI: wormhole detection mechanism for ad hoc wireless networks. In: Proc. of IEEE 1st Symposium on Wireless Pervasive Computing, China, pp. 6–11 (2006)
Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc on-demand distance vector (AODV) routing. IETF Internet draft, MANET Working Group (2004)
Gupta, S., Kar, S., Dharmaraja, S.: WHOP: Wormhole attack Detection Protocol using Hound Packet. In: Proc. IEEE on Innovations in Information Technology, United Arab Emirates, pp. 226–231 (2011)
Hu, Y.C., Perrig, A., Johnson, D.B.: PACKET LEASHES: A defense against wormhole attacks in wireless ad hoc networks. In: Proc. IEEE INFOCOM 2003, USA, vol. 3, pp. 1976–1986 (2003)
Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless Ad-hoc networks. In: Proc. 31st Computer Software and Applications, vol. 1, pp. 39–48. IEEE Computer Society, Washington, DC (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chanchal, K., Lobiyal, D.K. (2013). NTTM: Novel Transmission Time Based Mechanism to Detect Wormhole Attack. In: Singh, K., Awasthi, A.K. (eds) Quality, Reliability, Security and Robustness in Heterogeneous Networks. QShine 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 115. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37949-9_43
Download citation
DOI: https://doi.org/10.1007/978-3-642-37949-9_43
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37948-2
Online ISBN: 978-3-642-37949-9
eBook Packages: Computer ScienceComputer Science (R0)