International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 05 | May -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2208
Efficient Detection and prevention of Wormhole Attacks in Wireless
Mesh Network
Fayaz Ahamed Shaikh
1
, Uttam Patil
2
1
Student, P.G. Department of Computer Science and Engineering, VTU/ KLE Dr M S Sheshgiri College of
Engineering & Technology, Belguam, India, 9902760958 (e-mail: fayazmshaikh@gamil.com).
2
Professor, P.G. Department of Computer Science and Engineering, VTU/ KLE Dr M S Sheshgiri College of
Engineering & Technology, Belguam, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless Mesh Networking is a rising technology
in order to offer an opportunity to construct a network that is
able to grow in terms of coverage to present service access (i.e.
internet access) for a large number of people with dissimilar
needs. WMNs are weaker to wormhole attack (one out of much
kind of attacks). In a usual wormhole attack, two or more
malicious nodes plan jointly in establishing a tunnel by a well-
organized communication medium. The aim of this paper is to
explain a wormhole detection algorithm for WMNs which
detect the wormholes by calculating neighbor list as well as
directional neighbor list of the source node. The main aim of
the algorithm is that it can offer approximate location of
nodes and effect of wormhole attack on all nodes which is
helpful in implementing countermeasures. The performance
evaluation is complete in varying no. of wormholes in the
network.
Key Words: AODV(Ad hoc On-Demand Distance Vector),
WMN(Wireless Mesh Networks), Wormhole attack,
Wormhole Detection,Router
1. INTRODUCTION
WMN (Wireless Mesh Networks) is said to be a very
optimistic technology as well as will play an ever more
significant part in upcoming invention wireless mobile
networks. Wireless Mesh Network is characterized by active
self configuration, self organization, and self healing to allow
speedy deployment, low cost, simple maintenance, reliable
services, high scalability as well as attractive network
facility, connectivity and flexibility.
The wireless technology is less maintenance, low price and
speedily installable. According to the need of services a
number of indoor and outdoor network technologies are
designed. The wireless Mesh network is one of the essential
technologies among different technologies. Because of its
self-configuring and self-healing nature the (WMNs) wireless
mesh networks are very valuable. Thus this WMN can be
used for community networks, cellular mobile networks and
business networks.
Figure 1.1 Wireless Mesh Network
Figure 1.1 shows a typical WMN is constitute of a set of
stationary mesh routers (MRs) and a set of mesh clients to
interact through mesh routers that form the mesh backbone.
Wireless Mesh Networks having 2 nodes: (i) mesh clients (ii)
mesh routers. A wireless mesh router having extra routing
features to support mesh network. By numerous network
interface cards (NICs) a mesh router is usually equipped.
1.1Overview of WMNs Potential Attacks
To WMNs there are two sources of threats. First, external
attackers not belong to the mesh network can add erroneous
information or jam the communication. Second, from
internal compromised nodes there are additional harsh
threats come, since internal attacks are not as simple to stop
as external attacks. The attack can be normal, i.e., the
opponent misbehaves simply if misbehaving is helpful in
conditions of cost, resource reduction or obtained excellence
of service, if not it is malicious. Active and Passive attacks be
able to be notable. Passive attacks plan to take information
and within the network eavesdrop on the communication. In
case of active attacks, the attacker injects as well as into the
network modifies packets.