Open Access Open Access  Restricted Access Subscription or Fee Access

Discovering and Depurating Scheme for Wormhole Attack in Wireless Mesh Network

Sruthy O. Damodaran, Sindhu  S Nair


Wireless Mesh Network is one the most special application network because of its unique characteristics. Attacks are important challenging issue in networking. The Wormhole attack is the one of the most aggressive and unmerciful attack. In wormhole attack, a tunnel is established by two or more malicious nodes and one node captures the packets and tunnels them to another node. This attack is difficult to detect and no one can predict what the wormhole nodes does. In the proposed system, the network has to be considered as in a hierarchical clustered manner, where each communication is possible through cluster heads. A Weighted Clustering Algorithm (WCA) is adopted to select the Cluster Head (CH) and the rearrangement of the network as clusters by advertising of CH to its neighborhood.  The system is then desired to discover the wormhole attack in communication through adopted digital signature for authentication and depurating the malicious nodes which create the wormhole tunnel by CH from its neighbor table list. The CH advertises this information to its neighbors. The proposed scheme also uses the forwarding path method for secure data transmission efficiently and also try to minimize the control overhead.


Wireless Mesh Network, Wormhole Attack

Full Text:



Mainak Chatterjee, Sajal K. Das and Damla Turgut,“ WCA: A Weighted Clustering Algorithm for Mobile AdHoc Networks, ”Center of Research in Wireless Mobility and Networking ,Cluster computing ,2002 , Vol 5,193-204.

Martin Krebs, Andre Stein and Monica Alejandra Lora, “Topology Stability – based Clustering for Wireless Mesh Networks,” DFG Cluster of Excellence on Ultra-high Speed Information and Communication (UMIC), 2011.

Anil Singh and S.Tapaswi,”An Efficient Wormhole Avoidance Technique for Adaptive Wireless Networks”, Journal of Convergence Information Technology (JCIT), vol. 9, Number 6, November 2014

Anil Kumar Fatehpuria and Sandeep Raghuwanshi, “An Efficient Wormhole Prevention in MANET through Digital Signature”, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013

Rakesh Matam and SomanathTripathy,” WRSR: wormhole-resistant secure routing for wireless mesh network,” EURASIP journal on wireless communications and networking, 2013.

P Subhash and R Ramachandram,” Preventing Wormholes in Multi-hop Wireless Mesh Networks”,Third International Conference on Advanced Computing & Communication Technologies,2013.

Priti Gupta and Suveg Moudgil ,”A Novel Scheme to Detect Wormhole Attacks in Wireless Mesh Network ,” IJCSIT, vol.5 (3),4798-4801,2014.

Prof. Ramya S Pure, et al, “Trust based solutions using counter strategies for Routing attacks in MANET”, International Journal of Innovative Science, Engineering & Technology, vol. 1 Issue 4, June2014.

Ming-Yang Su,”WARP:A wormhole avoidance routing protocol by anomaly detection in mobile ad hoc networks”, Department of computer science and Information Engineering, Computer and Security 29,2010.

Thillaikarasi and Mary Saira Bhanu, “A Survey of Secure Routing Protocols for Wireless Mesh Networks”,International Journal of Computer Applications(0975-8887),Vol.97-No.6,July 2014.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.