Open Access Open Access  Restricted Access Subscription or Fee Access

AODV-TP and Wormhole Attack Detection in MANET

Yogendra Kumar Jain, Bhavana Gupta


With the  evolution  of  computer  networks extending boundaries, Mobile Ad hoc Network (MANET) has emerged as a new leading edge of technology to provide any where, any time communication. Unlike wired network, the mobile ad hoc network does not need any infrastructure, so it is very difficult to perform any kind of centralized anagement and control. The routing in Mobile adhoc network is difficult and number of reactive routing protocols like AODV, DSR, and DSDV has been implemented. In the first part of this work, we propose a new algorithm AODV-TP to improve existing on demand routing protocol and an attempt has been made to compare the performance of proposed algorithm (AODV-TP) with existing algorithm DSR and AODV. Ad hoc networks are susceptible to number of attacks, due to precise physical protection of each node and changeable nature of connection security in mobile ad hoc is distinctly difficult to achieve. This paper introduces the wormhole attack, a severe attack in ad hoc network that is very stimulating to defend against. This paper proposes an easiest way to detect wormhole attacks using RBM technique. The presented method shows that solution can be implemented using reactive protocol called AODV-TP.


Mobile Ad hoc Network, AODV, DSR, Wormhole Attack, DSDV.

Full Text:



D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” in Mobile Computing, Academic Publishers, 1996,pp 153-181.

C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, WMCSA '99, New Orleans, LA,February 1999, pp. 90–100.

S. R. Das, C. E. Perkins, E. M. Royer, and M. K. Marina, “Performance Comparison of Two On-Demand Routing Protocols for Ad Hoc Networks”, in IEEE Personal Communications Magazine special issue on Ad hoc Networking, Vol. 8, February 2001, pp. 16–28.

Mesut Gunes¸,Udo Sorges, Imed Bouazizi, “ARA -The Ant-Colony Based Routing Algorithm for MANETs”, in Proceedings of International Conference on Parallel Processing Workshops, August 2002, pp. 79-85.

S. Gwalani, E. M. Belding-Royer, C.E. Perkins, “AODV-PA: AODV with path accumulation”, in Proceedings of the IEEE Symposium on Next Generation Internet (NGI), Anchorage, AK, May 2003, Vol. 1, pp.527-531.

Zhao Qiang Zhu Hongbo, “An optimized AODV protocol in mobile adhoc Network”, 4th international conference on Wireless Communications Networking and Mobile Computing, WiCOM’08, Oct. 2008, pp.1-4.

Ammar Zahary and Aladdin Ayesh,“On-demand Multiple Route Maintenance in AODV”, International Conference on Computer Engineering and System, Nov. 2008, pp. 225-230.

Sung-Ju Lee and Mario Gerla, “AODV-BR: Backup Routing in Mobile Ad hoc Networks”, Proceeding of IEEE Conference on Wireless Communications and Networking, WCNC, Vol. 3, Aug 2000,pp.1311-1316.

J.Elson, L.Girod, D.Estrin, “Fine–Grained Network Time

Synchronization using Reference Broadcasts”, Proceedings of the 5th symposium on Operating systems design and implementation, OSDI 2002, Vol. 36, Issue SI, 2002, pp.147-163.

Y. C. Hu, A. Perrig, D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks”, In Twenty-Second Annual Joint Conference of the IEEE Computer and Communications,INFOCOM 2003, Vol. 3, April 2003, pp.1976-1986.

Hongbo Zhou, “A Survey on Routing Protocols in MANETs”,Department of Computer Science and Engineering, Michigan State University, ETF RFC 3561, 2003.

L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L. W. Chang,“Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach”, IEEE Wireless Communication and Networking Conference (WCNC), Vol. 2, March 2005, pp. 1193-1199.

Lijun Qian, Ning Song, Xiangfang Li, “Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks through Statistical Analysis of Multi-path”, IEEE Conference on Wireless Communications and Networking, Vol. 4, March 2005, pp. 2106-2111.

Hon Sun Chiu, King-Shan Lui, “DelPHI: Wormhole Detection Mechanism for Ad hoc Wireless Networks”, 1st International Symposium on International Symposium on Wireless Pervasive Computing, Jan.2006, pp 16-18.

P. Kruus, D. Sterne, R. Gopaul, M. Heyman, B. Rivera, P. Budulas, B.Luu, T. Johnson, N. Ivanic, and G. Lawler, “In-band wormholes and Countermeasures in OLSR Networks”, In IEEE SecureComm and Workshop, Aug-Sep 2006, pp. 1-11.

Mahajan, M. Natu, A. Sethi, “Analysis of Wormhole Intrusion Attacks in MANETs”, IEEE Military Communications Conference, MILCOM 2008,Nov. 2008, pp. 1-7.

D. Q. Nguyen, L. Lamont, “A Simple and Efficient Detection of Wormhole Attacks”, New Technologies, Mobility and Security, NTMS'08, Nov 2008, pp. 1-5.

S. Sethi, S. K. Udgata, “Optimized and Reliable AODV for MANET”,International Journal of Computer Application, Vol. 3, No. 10, July 2010.

Mohit Jain, Himanshu Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad Hoc Networks”, IEEE International Conference on Advances in Computing, Control, & Telecommunication Technologies,ACT '09, Dec. 2009, pp. 555-558.[20] Network Simulator-2, on 1 April

F. Nait-Abdesselam, B. Bensaou, J. Yoo, “Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol”, In IEEE Wireless Communication and Networking Conference, WCNC 2007,March 2007, pp. 3117-3122.

Broch J.,Maltz D.A., Johnson D.B.,Hu Y.C.,and Jetcheva, “A Performance comparison of multi-hop wireless Ad hoc network routing protocols”, Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking, ACM MOBICOM’08,Oct. 2008, pp. 85-97.

T. Hayajneh, P. Krishnamurthy, D. Tipper, "DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks”, Third International Conference on Network and System Security, NSS '09,2009, pp.73-80.

M. A. Azer, S. M. EL-Kassas, M. S. El-Soudani, “An innovative approach for the wormhole detection and prevention in wireless ad hoc networks”,International conference on Networking Sensing and control,ICNSC’2010, April 2010, pp.366-371.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.