Skip to main content

Trusted Routing in AODV Protocol Against Wormhole Attack

  • Conference paper
  • First Online:
Future Information Technology, Application, and Service

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 164))

Abstract

This research aims to develop an enhanced version of AODV including trust and reputation that will ensure the transmission of messages in a secure way avoiding wormhole attackers in the network. Firstly, wormhole attackers are identified depending on their transmission related misbehavior with respect to other nodes in the network. Next, appropriate trust value is assigned to the misbehaving nodes. Furthermore the measure of trust is calculated by considering the past interaction between the considered node with other nodes in terms of direct and indirect interactions and related trust values. Finally, the trust evaluating node takes the decision to include or not to include the trustee node in discovered route and secures the path from wormhole attacker. The key concept to interpret the misbehavior of a node is based on its responsiveness towards incoming route requests in terms of associated processing time, latency, threshold time duration. To facilitate the trust computation and respective decision, the enhanced version assigns the tasks to different functional components: Context Analyser, Event Analyser, Trust Manager, Trust Repository, Notifier, Decision Manager, Trust Engine and Node Manager. Our analysis and simulation results show the effectiveness of our proposal against wormhole attack in AODV.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alshamrani, A. S.: PTT: packet travel time algorithm in mobile ad hoc networks. Workshops of International Conference on Advanced Information Networking and Applications, IEEE pp. 561–568 (2011)

    Google Scholar 

  2. Alam, M. R., Chan, K. S.: RTT-TC: A topological comparison based method to detect wormhole attacks in MANET, 12th International Conference on Communication Technology, IEEE. pp. 991–994 (2010)

    Google Scholar 

  3. Basagni, S., Conti, M., Giordano, S., Stojmenovic, I.: Mobile Ad Hoc Networking (chapter: 10). Wiley

    Google Scholar 

  4. Huang, W., Yan X., Chen, D.: DAAODV: A secure ad-hoc routing protocol based on direct anonymous attestation. International Conference on Computational Science and Engineering, IEEE pp. 809–816 (2009)

    Google Scholar 

  5. Keer, S., Suryavanshi, A.: To prevent wormhole attacks using wireless protocol in MANET. International Conference on Computer and Communication Technology, IEEE, pp. 159–163 (2010)

    Google Scholar 

  6. Lacharité, Y., Dang Q. N., Wang, M., Lamont, L.: A trust-based security architecture for tactical MANETS. Military Communications Conference, IEEE pp. 1–7 (2008)

    Google Scholar 

  7. Perkins, C.: AODV routing implementation for scalable wireless ad-hoc network simulation (SWANS). http://jist.ece.cornell.edu/docs/040421-swans-aodv.pdf

  8. Qiu, X. F., Liu, J.W., Sangi, A. R.: MTSR: wormhole attack resistant secure routing for ad hoc network. IEEE Youth conference on Information Computing and Telecommunications, pp. 419–422 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Swarnali Hazra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dortdrecht

About this paper

Cite this paper

Hazra, S., Setua, S.K. (2012). Trusted Routing in AODV Protocol Against Wormhole Attack. In: J. (Jong Hyuk) Park, J., Leung, V., Wang, CL., Shon, T. (eds) Future Information Technology, Application, and Service. Lecture Notes in Electrical Engineering, vol 164. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-4516-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-4516-2_26

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-4515-5

  • Online ISBN: 978-94-007-4516-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics