International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 05 | May 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 6255 A Modified AODV based Wormhole Detection Using Hop Count and Packet Sent and Receiving Ratio in MANETs M.Ramya 1 , P.Nagarjuna Reddy 2 , M.Triveni 3 , M.Ratheesh 4 , Y.Adi Lakshmi 5 1,2,3,4 UG Scholar, Dept. of Computer Science Engineering, Gudlavalleru Engineering College, Andhra Pradesh, India 5 Associate Professor, Dept. of Computer Science Engineering, Gudlavalleru Engineering College, Andhra Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The remote correspondence is well known these days .The remote advances gives quick organization and the remote gadgets are anything but difficult to haul around and needs less support.MANETs are turning out to be increasingly basic using because of their simplicity of organization. Manets have dynamic framework on account of this security is an extremely challenging issue in MANET, there is a high chance that the middle nodes can be vindictive and they may be a danger to the security. Wormhole is one of the most every now and again happening attacks in adhoc systems. In wormhole attack, the attacker gets packets at one point in the system and passages them to another piece of the system and replays them into the system starting there forward.The proposed framework is a proficient identification and anticipation strategy of wormhole attack with AODV convention. Recognition of wormhole attack is finished utilizing number of hops ,delay per hop and number of packets sent and got at every node. Prevention of wormhole attack is finished utilizing verification of nodes. Simulations are finished utilizing NS2 arrange test system. Key Words: Wormhole Attack, MANET, AODV protocol, Network Security, HopCount, Packets sent and received. 1. INTRODUCTION Portable Ad-hoc Network (MANET) is a gathering of remote versatile hosts without fixed system framework and brought together organization. Multi-hop packets are utilized to set up correspondence in MANET. A portable adhoc arrange is a gathering of versatile nodes, which shapes a temporary and these nodes regularly have a fractional communicated go and, thus, every node seeks after the assistance of its contiguous nodes in quickening packets and from this time forward the nodes in an impromptu system can turn as together switches and has. Subsequently a node may forward packets among different nodes as fine as track client applications. Naturally these kinds of systems are reasonable for circumstances where either no unmoving structure exists or situating system isn't conceivable. In our everyday life the need of the buyer is expanding as far as speed and quick conveyance of information. A remote system shows a huge job in current period for imparting information with irrelevant overhead and incomparable conceivable speed. These frameworks have grown efficient with the layout of portability thought of nodes. But MANET is a difficult field: MANET comprises of various assets; the line of defence is extremely questionable;Nodes work in shared remote medium; Topology changes unpredictably and powerfully; Reliability in the radio connection is an issue; association breaks are frequent. Additionally, the density of nodes, number of hosts and portability of these hosts may fluctuate in various applications. Fig -1: Mobile Ad-hoc Network MANET has a few vulnerabilities, for example, Resource accessibility, Scalability, Bandwidth requirement, Limited power supply, Cooperativeness and Dynamic Topology. In MANET, all frameworks organization limits, for instance, coordinating and pack sending, are performed by centers themselves in a self-sifting through way. Therefore, making sure about a portable promotion ad-hoc arrange is a challenging task. The objectives to assess if versatile specially appointed system is secure or not are Availability, Confidentiality, Integrity, Authentication, Non denial and Authorization. The expanding prevalence and use of remote innovation is making a requirement for progressively secure remote systems. Remote systems are especially defenseless against a Powerful attack known as the wormhole attack, which is one of the risky attacks. Wormhole attack is a grave attack where in two attackers find themselves deliberately in the system. At that point the assailants continue tuning in to the system, and record the remote data. The underneath figure shows the two attackers are situated in a solid vital situation in the system. In wormhole attack, the attackers put themselves in ground-breaking key spot in the system. They use their area, that is, they have most limited course among the