International Journal of Computer Applications (0975 8887) Volume 104 No.7, October 2014 18 An Efficient Approach for Detection of Wormhole Attack in Mobile Ad-hoc Network Shivangi Dwivedi Dept of Computer Engg & Application National Institute of Technical Teacher’s Training and Research Bhopal, India Priyanka Tripathi Dept of Computer Engg & Application National Institute of Technical Teacher’s Training and Research Bhopal, India ABSTRACT Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree of mobility. In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. In such networks, the wireless mobile nodes may dynamically enter the network as well as go-ahead the network. Mobile ad hoc network is a group of many more devices or nodes with the capability of communication and networking. MANET encounter by number of security threat because of its open entrusted environment with little security settlement, even if security over MANET is not to be enhance up to satisfactory level because of its characteristics Security is an essential service for wired and wireless network communication. Due to its mobility and self routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layers, Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbors and makes conversation through the wormhole tunnel. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. For wormhole attack to have a best impact on the wired or wireless network, it must fascinate a huge amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem of wormhole attack. General Terms Security, Encapsulation, Reactive Routing, Proactive Routing Keywords MANET, Wormhole attack, Wormhole detection technique, Wormhole Avoidance, Routing protocols, Wormhole attack modes. 1. INTRODUCTION Wireless network refers to a network, in which all the devices communicate without the use of wired connection. Wireless networks [1] are generally implemented with some type of remote information transmission system that uses electromagnetic waves, for the carrier and self- configuring network that is formed automatically by a set of mobile nodes without the help of a fixed infrastructure or centralized management. Each node is prepared with a wireless transmitter and receiver, which allow it to interact with other nodes in its range. In order for a node to forward a packet to a node that is out of its radio range, the support of other nodes in the network is needed; this is known as multi-hop interaction. Thus each node must accomplish as both a host and a router at the same time. The primary challenge in building a MANET is equipping each device to continuously maintain the information required to properly route transit. Such networks may achieve by themselves or may be connected to the larger internet. Privacy protection of mobile ad hoc networks is more demanding than that of wired networks due to the open nature and mobility of wireless media. A mobile Ad hoc network (MANET) is a collection of two or more devices or nodes equipped with wireless communication and networking capabilities [3].These node includes laptop, computers, PDAs and wireless phones etc, have a limited transmission range. In a MANET, nodes which are within each other’s wireless transmission ranges linked directly, nodes that are farther from each other’s range have to rely on some other nodes to transmit messages [4]. Thus, a multi-hop scheme develop, where several intermediary hosts broadcast the packets sent by the source host before they reach the final destination Due to the mobility in the ad hoc network, change of connective states and other effects of wireless transmission such as fading , multipath propagation, intervention etc. Figure.1 Mobile Ad-hoc Network