Abstract—Wireless networks are suspectible to many attacks, including an attack known as the wormhole attack. The wormhole attack is very powerful, and preventing the attack has proven to be very difficult. A strategic placement of the wormhole can result in a significant breakdown in communication across a wireless network. In such attacks two or more malicious colluding nodes create a higher-level virtual tunnel in the network, which is employed to transport packets between the tunnel endpoints. These tunnels emulate shorter links in the network and so act as benefit to unsuspecting network nodes which by default seek shorter routes. This paper present a novel trust-based scheme for identifying and isolating nodes that create a wormhole in the network without engaging any cryptographic means. With the help of extensive simulations, we demonstrate that our scheme functions effectively in the presence of malicious colluding nodes and does not impose any unnecessary conditions upon the network establishment and operation phase.
Index Terms—Ad hoc networks, computer network security, computer networks, tunneling, wireless LAN, wormhole, packetleash.
Shalini Jain is Lecturer with the Maharaja Surajmal Institute of Technology, Affilated with Idraprashta University, New Delhi, India (phone:+91-9873099411; fax: 91-11-25528116; e-mail: firstname.lastname@example.org).
Dr. Jain is an Asst .Prof with Delhi University (Netaji Subash Institute Of Technology,) in Computer Science Department, New Delhi, India. (e-mail:Jain_Satbir@yahoo.com).
Cite: Shalini Jain and Satbir Jain, "Detection and Prevention of Wormhole Attack in Mobile Adhoc Networks," International Journal of Computer Theory and Engineering vol. 2, no. 1, pp. 78-86, 2010.