Abstract
Over the last few years there has been explosive growth in the use of the Wireless communications from top to bottom i.e. Satellite transmission to home Wireless personal area networks. The primary advantage of a wireless network is the ability of wireless node to communicate with the universe during mobility. Two basic system models of a wireless system are fixed and Mobile Adhoc Network has been developed for the wireless network paradigm. The first model consists of multiple numbers of mobile workstations and relatively fewer but more powerful, having fixed routers. The second model has been proposed to set up a network on-demand basis. When a collection of wireless mobile nodes are capable of communicating with each other without the use of network infrastructure, centralized administration, or centralized control like mobile switching centers or base stations, that set up is called Mobile Adhoc Network. Here each mobile node operates not only as a host but also as a router, forwards packets to other mobile nodes in the network that may not be within direct wireless transmission range of each other. Each node participates in an Adhoc routing protocol (Yadav et al. in Comput Netw 118:15–23, 2017) that allows it to discover multiple paths through the network to any other node. Institute of Electrical and Electronics Engineers 802.11 (IEEE 802.11) [Kaur et al. in Int J Res Advent Technol 5(8), 2017] is a vital part of pervasive networks, which is a special kind of network where users can join and communicate anytime or anywhere on the fly. It is a popular kind of network because its applications cover a variety of areas. A unique communication paradigm is used which is able to run without fixed infrastructure and relies on wireless terminals for routing and transporting services. A number of security and scalability issues arise due to its wireless transmissions and unpredictable topology changes. Open standard, dynamic topology, scattered arrangements, and multi-hop routing are crucial features of IEEE 802.11 networks that make them vulnerable to various kinds of attacks. A Wormhole attack is one of the serious kinds of attack. Thus, security is the most important concern in IEEE 802.11 networks. This paper presents the refurbishment of the routing structure of Ad hoc On-Demand Distance Vectors (AODV) protocol (Ning et al. in Proceedings of the IEEE systems, man and cybernetics society information assurance workshop (IAW), West Point, New York, USA, pp 60–67, 2003). It will be helpful to safeguard IEEE 802.11 networks from Wormhole attacks by preventing Wormhole Attacks. The DAPS technique had been presented in Saini et al. (Int J Res Advent Technol 6(4), 2018) to detect Wormhole Attacks. Further to DAPS technique, a new Wormhole prevention technique has been introduced in this paper called Proactive Prevention Key Solution (PPKS).
Similar content being viewed by others
Availability of data and material
Data and material is available in this paper.
Code Availability
Code created or generated during this study are included in this paper.
Data Availability
All data generated or analyzed during this study are included in this published article along with its supplementary information files.
References
Parminder Kaur Saini, Pankaj Kumar Verma, J. S Sohal (2018). DAPS for Detecting Wormhole Attacks in IEEE 802.11 networks using ad hoc On-demand distance vector routing protocol. International Journal of Research in Advent Technology, 6(4), E-ISSN: 2321-9637.
Aashima, Vishal Kumar Arora (2014). Detection and prevention of wormhole attack in MANET using DSR protocol. IOSR Journal of Computer Engineering (IOSR-JCE), 16(6), Ver. VIII, PP 44–47. e-ISSN: 2278-0661, p-ISSN: 2278-8727
Shahjahan Ali, Parma Nand, Shailesh Tiwari (2020). Impact of wormhole attack on AODV routing protocol in VANET over real map with detection and prevention approach. International Journal of Vehicle Information and Communication Systems, 2020, Vol. 5, No. 3. pp. 354-373.
Ghugar, J., & Pradhan, J. (2019). A review on Wormhole attacks in wireless sensor networks. Research gate.
Parminder Kaur, P. K, Verma, J.S. Sohal, (2017). A review of Wormhole attacks for IEEE 802.11 networks. International Journal of Research in Advent Technology, 5(8). E-ISSN: 2321-9637.
Mohammed, D., Omer, M., & Nguyen, V. (2018). Wireless sensor network security: Approaches to detecting and avoiding wormhole attacks. Journal of Research in Business, Economics and Management.
Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M. (2006). True Link: A practical counter measure to the Wormhole attack in Wireless Networks. IEEE Explore.
Tackett, J. (1998). A book on “Using Linux”, Steven Forrest Burnett. ISSN - 13: 978-0-585-13028-6, ISBN: 0-585-13028-0.
Gupta, S., & Das, B. (2013). An energy efficient and load aware routing scheme in multi sink wireless sensor networks. International Journal of Engineering Research and Development, 6(11), 31–35. Google Scholar.
Sarkar, D., Choudhury, S., & Majumder, A. (2018). Enhanced-Ant-AODV for optimal route selection in mobile ad-hoc network. Journal of King Saud University-Computer and Information Sciences, 1–25.
P. Ning, K. Sun (2003). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the IEEE systems, man & cybernetics society information assurance workshop (IAW), West Point, New York, USA (pp. 60–67).
Yadav, A. K., Das, S. K., & Tripathi, S. (2017). EFMMRP: Design of efficient fuzzy based multi-constraint multicast routing protocol for wireless ad-hoc network. Computer Networks, 118, 15–23. CrossRef Google Scholar.
Van Glabbeek, R., Höfner, P., Portmann, M., & Tan, W. L. (2016). Modeling and verifying the AODV routing protocol. Distributed Computing, 29, 279–331. https://doi.org/10.1007/s00446-015-0262-7
Funding
The authors declare that no funds, grants, or other support were received during the preparation of this manuscript from any resources.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study's conception and design. Material preparation, data collection and analysis were performed by Dr. Parminder Kaur Saini. The first draft of the manuscript was written by Dr. Parminder Kaur Saini. Dr. Amanpreet Singh commented on previous versions of the manuscript and Dr. J.S. Sohal contributed to the proofreading of the manuscript. All the authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
There is no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Saini, P.K., Singh, A. & Sohal, J.S. Proactive Prevention Key Solution for Wormhole Attack in IEEE 802.11 Networks Using AODV. Wireless Pers Commun 128, 89–108 (2023). https://doi.org/10.1007/s11277-022-09942-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09942-1