Abstract
A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managing mobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks. The malicious node exploits these vulnerabilities to lunch attacks, especially when nodes have mobility and network do not have constant topology, like wormhole attack. This paper presents a lightweight technique that detects the wormhole attacks in MANET. In the proposed technique, the source node calculates the average sequence number of the reply (RREP) packets. If the sequence number of the corresponding node exceeds the calculated average value of the sequence number, then all traffic is discarded, and the node is marked as malicious. The proposed technique is less complex, power-efficient, and enhances network lifetime as more data packets are delivered to the destination node.
| Original language | English |
|---|---|
| Article number | e2 |
| Pages (from-to) | 1-6 |
| Number of pages | 6 |
| Journal | EAI Endorsed Transactions on Scalable Information Systems |
| Volume | 29 |
| DOIs | |
| State | Published - 2021 |
| Externally published | Yes |
Bibliographical note
Publisher Copyright:Copyright © 2020 Zulfiqar Ali Zardari et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution, and reproduction in any medium so long as the original work is properly cited.
Keywords
- Average sequence number
- Denial of service
- MANET
- Reply (RREP) packet
- Wormhole attack
ASJC Scopus subject areas
- Software
- Information Systems
- Hardware and Architecture
- Computer Science Applications
- Computer Networks and Communications
- Information Systems and Management