Sei sulla pagina 1di 5

Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)

IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

Detection and Prevention of Wormhole Attack in


WiMAX Based Mobile Adhoc Network
Mr.Shaubham N.Ghormare
Prof.Swati Sorte1, Dr.S.S.Dorle2
Department of Electronics Engineering
Department of Electronics Engineering
G. H. Raisoni College of Engineering
G. H. Raisoni College of Engineering
Nagpur, India
Nagpur, India
Email:snghormare@gmail.com
Email:swati.sorte24@gmail.com,sanjay.dorle@raisoni.net

Abstract– Wormhole attack is the very hazardous attack in the


wireless network which comes in network routing protocol and
encryption and decryption security system. An Adhoc system is a
self-prepared network, without a principal coordinator, and
which regularly fluctuates its topography. In this paper we
explained the detection and prevention of wormhole attack in
WiMAX based mobile adhoc network (MANET) with AODV
routing protocol. In this attack the attacker mobile nodes keeps
packet to another location of the network and then forward it to
another attacker mobile node away from the tunneling. This
research work is carried out in Network Simulator (NS2)
software. Initially the basis WiMAX based mobile adhoc network
is formed with AODV routing protocol and then by inserting
wormhole attack the performance parameters like throughput,
delay and packet delivery ratio are considered for analysis of the
designed mobile adhoc network. Fig. 1. Mobile Connections in MANET
Keywords – Wormhole attack, WiMAX, MANET, AODV,
throughput, delay and packet delivery ratio. Routing protocols for outdated wired networks are
intended to support marvelous numbers of nodes, but they
I. INTRODUCTION adopt that the comparative location of the nodes will usually
A mobile adhoc network is a group of mobile nodes, which remain unaffected. MANET that contains these nodes has
forms a provisional system deprived of the help of centralized been planned so far. Though, in MANET atmosphere, the
management or normal provision devices frequently network performances depend on the node numbers and node
obtainable as predictable networks. These nodes normally movement [2]. In mobile adhoc network routing protocol
have a partial broadcast range and, so, each node pursues the plays an important role to show route to data packets. Here we
help of its adjacent nodes in accelerating packets and choose AODV i.e. adhoc on demand distance vector routing
henceforth the nodes in an ad hoc network can turn as together protocol because this is reactive routing protocol and it gives
routers and hosts. Thus a node may onward packets among better performance parameters as compared to proactive
other nodes as fine as track user applications. By nature these routing protocol. AODV is based on routing requests and
types of networks are suitable for situations where either no routing replies. Once the transmitter node wants to onward the
motionless structure exists or positioning network is not
packet, first, discovery out whether the transmitter node has a
thinkable. In our day to day life the need of the consumer is
increasing in terms of speed and fast delivery of data. A legal route to the endpoint node, if there is a straight, then
wireless network shows a significant role in current era for furthering data, if not, the routing lookup procedure is
communicating data with negligible overhead and supreme completed. It has three simple procedure message finds RREQ
possible speed. These systems have developed well-organized message, RREP message and RRER message [3].There is
with the outline of mobility idea of nodes [1]. The mobile certain simple attack that origins serious difficulties in adhoc
nodes are interconnected in the mobile adhoc network as network are Black hole attack, Grey hole attack, Wormhole
shown in figure 1. In overall, an adhoc system is a network in attack etc. In wormhole attack, aggressor offers two block
which each node is hypothetically a router and each node is points. These block points used to decrease the system also
hypothetically mobile. The occurrence of wireless used to investigate traffic as chosen any time. Bogus
communication and movement make an adhoc system impressions are used to generate block points by joining some
dissimilar outdated wired network and needs that the routing other nodes collectively.
protocols castoff in an adhoc network be built on novel and
dissimilar principles.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1097


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

NLOS obligation in April 2003. The standard functions in


approved and unrestricted frequencies between 2 GHz and 11
GHz, and it is an extension of the IEEE 802.16 standard.
WiMAX assigns resources to users on each uplink and
downlink broadcast [10].

II. METHODOLOGY
We designed WiMAX based mobile adhoc network by
using NS2 software. The wormhole attack is done by the node
in the mobile adhoc network. The wormhole detection process
is given in figure 3.

Fig. 2. Scenario of Wormhole attack

The scenario of wormhole attack is given in figure 2.


Wormhole attack makes a channel. Channel records traffic
statistics at one network position. Afterward this attacker
channel data to additional location far away from the network
or in a network. This is one of the bouts which is used
transversely numerous adhoc routing protocol. Attacker is
concealed at advanced layer so allow seeing wormhole attacks
in MANET. In out of band wormhole, attacker node founds a
straight link among two block points. This associated link is
exterior link which is both wired and wireless medium.
Packets are acknowledged at one end of the connection though
it is communicating packets using additional end of the
connection. By this method, great quantities of packets are
sending through the wormhole [4]. It is very durable attack
and it is owing to the collaboration among dual malicious
nodes which sees the topography of the network. In this attack
two malicious nodes generates the tunnel and capture the
traffic [5]. If a wormhole is shaped, certain node couples
might find “smaller” track through the wormhole and
henceforth is organized by the wormhole [6].
If the wormhole will only quietly send all the traffic from
one place in the network to another place that is distant away,
then it could be valuable for the system operation as it will
progress the network connectivity. Inappropriately, once the
traffic is routed through the wormhole, the attacker will Fig. 3. Flow chart of wormhole detection
improve complete control over the traffic. Then he can jump
his spiteful actions by selectively tumbling data packs which
will lesser the network throughput or supply all the traffic and Let us assume that any sender wants to communicate with
later make cryptanalyst is bouts [7].The wormhole attack can the receiver in the network. Now set the target along the
harshly disturb the routing protocols based on shortest second hop along the route. Send HELLO message to all the
postponement and shortest route by transporting packets neighbors of the sender mobile node. Mark one hop route on
earlier and with lesser amount of hops, correspondingly the route not on the existing route. Now ask the entire
[8].The open nature of wireless standard is integrally fewer neighbor except marked node to fine target and report number
safe and therefore makes it susceptible in contradiction of of hops. If numbers of hopes are greater than sensitivity
numerous types of malicious attacks. These attacks can be parameter then wormhole attack is detected. If not then fine
either inactive or active attacks [9].In this work we design next hope sender and find is sender last node before
mobile adhoc network by using WiMAX i.e. IEEE 802.16 destination? If yes then get neighbors and on hop neighbors of
standard. Wireless broadband access is established up similar destination and then ask neighbor to find out indirect route to
cellular schemes, by base stations that facility a range of target. Now check if number of hopes are 2 is greater than
several miles/kilometers. Base stations do not unavoidably sensitivity parameter or not. If yes then wormhole attack is
have to exist in on a tower. The IEEE 802.16 standard offers detected, if no then not detected. To prevent this wormhole
the substance for a wireless MAN business. However, the attack we can separate tunnel to send the data packets from
physical layer is not appropriate for lesser frequency claims one mobile node to other. Here on the one terminal of tunnel
where non-line-of-sight (NLOS) process is obligatory. For this sender will transmit the packet and at another end reception
aim, the IEEE printed 802.16a standard to accommodate will be takes place.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1098


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

III. SIMULATION PARAMETERS & NETWORK MODEL The design steps of the network model are given in figure
The simulation parameters to design WiMAX based 4. The WiMAX based mobile adhoc network is formed in
mobile adhoc network is given in the table 1. WiMAX works NS2. Firstly the WiMAX parameters as well as simulation
on the licensed as well as unlicensed frequency bands. To parameters which are given in the table 1 are set. Then the
design WiMAX based MANET system we choose unlicensed source and destinations positions of all sender and receiver
2.4 GHz frequency which comes under the band of line of mobile nodes are set with some fixed mobility’s. Here all
sight frequency band for WiMAX standard. The bandwidth of mobile nodes will change their locations so as to change the
the channel is 20 MHz. here we used two ray ground topology of the network. Now connect UDP and CBR agents
propagation model for transmission of the packets by multiple to all sender mobile nodes and NULL agent to all receiver
paths. Mac type is IEEE 802.16 i.e. WiMAX. Routing nodes. Now start the simulation. Before data transmission and
protocol plays crucial role in any adhoc network. Here we reception wormhole attack will be detected by the system and
choose AODV reactive routing protocol to determine the if it occurs then it will be prevented. Now it’s time to calculate
various routes for the transmission of the data. Total number performance parameters of the network. Here we calculate
of mobile node in this mobile adhoc network is 10. The total throughput, delay and packet delivery ratio of the designed
simulation time is 10 sec and the simulation area is 500m X system.
500m.
IV. RESULT
TABLE 1. Simulation parameters of designed network
The designed WiMAX based mobile adhoc network
scenario consists of 10 mobile nodes and one base station. In
Parameter Quantity WiMAX based mobile adhoc network packet always transfer
Frequency 2.4 GHz through base station towards the receiver node. Figure 5
shows that data transmission and reception takes place in
Bandwidth 20 MHz
between two mobile nodes through base station. Circle
Propagation Model Two Ray Ground Propagation indicates coverage area of the network.
Mac 802.16 (WiMAX)
Routing Protocol AODV
No. of Nodes 10
Simulation time 10 Sec
Simulation Area 500m X 500m

Fig. 5. Snapshot of the network

Figure 6 shows that the scenario of designed network with


position of one mobile node. The source and destination
positions of each and every node lie in the range of simulation
area only. Node 3 and 4 changes their positions as shown in
Fig. 4. Flow chart of design steps on network model figure 6 when we compare with figure 5.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1099


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

Fig. 6. Snapshot of the network with node position


Fig. 9. Packet delivery ratio of network
The performance parameters such as throughput, delay and
packet delivery ratio are considered here to evaluate the TABLE 2. Average results for AODV routing protocol
performance of WiMAX based mobile adhoc network. Figure
7 shows that the graph between simulation time and
throughput. Throughput is continuously increasing with Performance parameter Quantity
increase in simulation time. The time taken by packet to move Throughput 1610.27 Bps
from source to destination i.e. delay should be minimum for Delay 0.0143 msec
any network. Here delay is in the range of msec which means
that the data transmission time is very less as shown in figure Packet delivery ratio 98.45%
8.
Figure 9 shows that the how much percentage of packets
are successfully received at the receiver nodes. In ideal
network packet delivery should be 100% but due to external
interference, queue size the packets get dropped. In this work
due to proper queue size and proper packet interval time the
numbers of packets dropped are very less. Hence packet
delivery ratio is very much high in this designed network
system. The average values of all performance parameters are
given in table 2.
V. CONCLUSION
The conclusion of this research work is that wormhole
attack can be easily detected and prevented by this tunneling
method. The throughput of the designed system with AODV
routing protocol is quite better than existing mobile adhoc
Fig. 7. Throughput of network
network. The time required to transmit the packet from sender
to receiver i.e. delay is very very low. So that data
transmission took place in rapid manner. During any attack the
packet drop level increases. But here the packet delivery ratio
is above the expectations as given in table 2. So here we can
conclude that this method provide better and fast performance
as compared to other methods of detection and prevention of
wormhole attack.

VI. FUTURE WORK


The researchers are continuously working on the new
method of detection and prevention of wormhole attack. At
the same time anyone can do work on the power reduction
technique during detection and prevention of attack. One can
do research on using reactive, proactive and hybrid routing
protocols on the WiMAX based MANET system with various
Fig. 8. Delay of network methods of wormhole detection and prevention. Instead of

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1100


Proceedings of the 2nd International conference on Electronics, Communication and Aerospace Technology (ICECA 2018)
IEEE Conference Record # 42487; IEEE Xplore ISBN:978-1-5386-0965-1

UDP protocol we can use TCP protocol also to transmit and [5] Brijendra Kumar Joshi and Megha Soni, “Security Assessment of
AODV Protocol under Wormhole and DOS Attacks”, IEEE
receive the data packets. If one increases the simulation area
Conference, 2016.
then relay stations may increase so anyone can work on the [6] Susheel Kumar, Vishal Pahal and Sachin Garg, “Wormhole attack
technique which will increase the packet delivery ratio of the in Mobile Ad Hoc Networks: A Review”, IRACST – Engineering
system. Science and Technology: An International Journal (ESTIJ), ISSN:
2250-3498, Vol.2, No. 2, pp. 268-275, April 2012.
REFERENCES [7] A.VANI and D.Sreenivasa Rao, “A Simple Algorithm for
Detection and Removal of Wormhole Attacks for Secure Routing
[1] Mohan Patsariya and Anand Rajavat, “Hybrid Routing Approach In Ad Hoc Wireless Networks”, International Journal on Computer
and WIMAX Network for Minimization Routing Overhead and Science and Engineering (IJCSE), ISSN : 0975-3397, pp. 2377-
Increasing Radio Range in MANET”, IEEE Fourth International 2384, June 2011.
Conference on Computational Intelligence and Communication [8] Majid Khabbazian, Hugues Mercier and Vijay K. Bhargava,
Networks, 2012. “Wormhole Attack in Wireless Ad Hoc Networks: Analysis and
[2] Shoma Nakahara, Tomoyuki Ohta, and Yoshiaki Kakuda, Countermeasure”, IEEE, 2006.
“Experimental Evaluation of MANET Based on Autonomous [9] Priya Maidamwar and Nekita Chavhan, “A Survey on Security
Clustering and P2P Overlay Network”, IEEE First International Issues to Detect Wormhole Attack in Wireless Sensor Network”,
Symposium on Computing and Networking, 2013. International Journal on AdHoc Networking Systems (IJANS) Vol.
[3] Hao Zhang and Jinxu Guo, “Application of Manet Routing 2, No. 4, DOI: 10.5121/ijans.2012.2404, pp. 37-50, October 2012.
Protocol in Vehicular Ad Hoc Network Based on NS3”, IEEE [10] Zuber Patel and Upena Dalal,” Implementation and Evaluation of
Conference, 2017. Dynamically Weighted Low Complexity Fair Queuing (DWLC-
[4] Supriya Khobragade and Puja Padiya, “Detection and Prevention FQ)Algorithm for Packet Scheduling in WiMAX Networks”,
of Wormhole Attack Based on Delay Per Hop Technique for protocols and algorithms, China Communications, pp. 128-140,
Wireless Mobile Ad-hoc Network”, International conference on May 2016.
Signal Processing, Communication, Power and Embedded System
(SCOPES)-2016.

978-1-5386-0965-1/18/$31.00 ©2018 IEEE 1101

Potrebbero piacerti anche