Visible to the public Mitigating wormhole attack in MANET using absolute deviation statistical approach

TitleMitigating wormhole attack in MANET using absolute deviation statistical approach
Publication TypeConference Paper
Year of Publication2018
AuthorsMajumder, S., Bhattacharyya, D.
Conference Name2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC)
ISBN Number978-1-5386-4649-6
Keywordsabsolute deviation, absolute deviation correlation coefficient, absolute deviation statistical approach, AD correlation, Color, composability, Correlation, correlation coefficient, correlation methods, covariance, fake tunnel, MANET, MANET Attack Mitigation, MATLAB simulator, Metrics, mobile ad hoc networks, Peer-to-peer computing, pubcrawl, Resiliency, telecommunication network routing, telecommunication security, Throughput, wormhole attack, wormhole attack mitigation
Abstract

MANET is vulnerable to so many attacks like Black hole, Wormhole, Jellyfish, Dos etc. Attackers can easily launch Wormhole attack by faking a route from original within network. In this paper, we propose an algorithm on AD (Absolute Deviation) of statistical approach to avoid and prevent Wormhole attack. Absolute deviation covariance and correlation take less time to detect Wormhole attack than classical one. Any extra necessary conditions, like GPS are not needed in proposed algorithms. From origin to destination, a fake tunnel is created by wormhole attackers, which is a link with good amount of frequency level. A false idea is created by this, that the source and destination of the path are very nearby each other and will take less time. But the original path takes more time. So it is necessary to calculate the time taken to avoid and prevent Wormhole attack. Better performance by absolute deviation technique than AODV is proved by simulation, done by MATLAB simulator for wormhole attack. Then the packet drop pattern is also measured for Wormholes using Absolute Deviation Correlation Coefficient.

URLhttps://ieeexplore.ieee.org/document/8301780
DOI10.1109/CCWC.2018.8301780
Citation Keymajumder_mitigating_2018