Prevention of Wormhole attack in Mobile Ad-hoc Network (MANET) 1 Miss. Samrudhi P. Bonde, 2Miss. Sayali N. Gajare , 3Mr. Manjitsing V. Patil, 4Mr. Aniket S. Kolte. Department of Computer Engineering, Shram Sadhana Trust, College of Engineering, Jalgaon-India. 1 bondesamrudhi@gmail.com, 2 sayaligajare7@gmail.com, 3 manjeet1811@gmail.com, 4 aniketkolte11@gmail.com . 1,2,3,4 Abstract:- A Mobile Ad-Hoc Network (MANET) is a the important issue in Mobile Ad-hoc Network (MANET). set of mobile nodes and wireless communication link The ultimate goal of the security for MANET is to provide used to connect those nodes. Nodes in a MANET are availability, confidentially, integrity, and authentication to free to move independently in the network. MANET is ensure secure services to the user. Mobile Ad-hoc an infrastructure less network with no fixed base networks are susceptible to various routing attacks such as station therefore Security is one of the major issues, wormhole, gray hole, vampire attack. Wormhole Attack is because of its dynamic topology. In wormhole attack a one of the most severe attacks on routing protocols in set of misbehaving nodes creates a high speed tunnel which two or more unauthenticated nodes receive packets using this it causes data traffic and route disturbance. at one point of the network and transmit them to another Misbehaving nodes add itself in a routing path then location by high speed wireless tunnel. drops the data packets in network. Propose approach is used to prevent wormhole attack in the mobile ad-hoc Wormhole Attack: network, which uses the Advanced Encryption Standards (AES) technique and 2Acknowledgement (2ACK) scheme to find the misbehaving nodes in the network. Keywords: Ad-hoc, MANET, Wormhole attack, AES Technique, Security, Prevention Techniques. I. Figure 1:Wormhole attack INTRODUCTION Mobile Ad-Hoc network are most popular wireless network because of infrastructure less nature. Mobile adhoc network is a set of independent mobile nodes that communicates with each other using communication a wireless link. Applications of mobile Ad-hoc networks include military communication system in case of critical situations, emergency relief operations, commercial and educational use in remote areas, and in meetings and other situations where the networking is mission oriented and communication based. Due to open medium, lack of centralized authorization system and continuous change in topological nature, Security is one of Therefore Wormhole attack is also known as tunneling attack. The wormhole attack is a multiple threat against packet routing in mobile networks that is particularly challenging to prevent. In the wormhole attack, an attacker node receives packets at one location, tunnels them and drops that data packet to another location in a network, where the packets are resent into the network to consume the bandwidth of network therefore it causes data traffic. This tunnel between two malicious attacker nodes is known as a Wormhole. In case of 2ACK, Let 2Ack received by each node is, II. Related work 2ACK = ACK (next node) +ACK (its successor node). Privacy-preserving routing is important for every ad hoc networks therefore it require stronger privacy protection. If acknowledgment received less at each node is than 2, Previous approach defines stronger privacy protection then node is the attacker or misbehaving and treated as regarding to privacy-preserving routing in mobile ad hoc wormhole. networks. It proposes AODV routing protocol which offer A. Advanced Encryption Standard (AES): effective link ability for all types of data packets. AODV is efficient however it uses a concatenation of ID-based encryption and group signature for route discovery. It calculates each next hop distance which is based on the certain threshold value and wormhole link using frequency. PT is based on public key cryptography, every node in network calculate next hop distance of its neighbor with the previous hop distance to identify the wormhole attack. The respective nodes detect the wormhole if the I. Figure 2: AES Algorithm. next hop distance goes beyond the certain threshold range. AES contains three block ciphers, AES-128, 192 and 256. [5] Each cipher encrypts and decrypts data in blocks of 128 III. Proposed system bits using cryptographic keys of 128, 192 and 256 bits respectively. For encryption and decryption, Symmetric or Mobile Ad-Hoc Network consists of a group of mobile nodes. Mobile ad-hoc network is unsecure from wormhole attack due to its dynamic topology therefore the proposed work is about to prevent the wormhole attack of mobile Ad-hoc network. In this system, for neighbor discovery and to find shortest path AODV protocol is used. To secure data in network proposed system uses Advanced Encryption Standard (AES) algorithm which encrypt the packet at each level by using secret key and ensuring secure delivery via decrypting the packet at the neighbor node and matching the distributed Secret Key, Attacker only retrieve data in encrypted form but it could not decrypt it. In addition to AES proposed system uses 2ACK scheme which detect and prevent the wormhole attack in the MANET. secret-key ciphers use the same key, so both the sender and the receiver must know and use the same secret key. All key lengths must be sufficient to protect secret data up to the authorized level. If data is Top Secret then it requires either 192- or 256-bit key lengths. There are 14 rounds for 256-bit keys, 12 rounds for 192-bit keys, and 10 rounds for 128-bit keys. Each round consists of multiple processing steps that include substitution, transposition and mixing of the input plaintext data and transform it into the final output of ciphertext data. [3] B. Algorithm for 2ACK Scheme: Figure 3: 2ACK Scheme. Traffic type TCP/UDP Routing protocols AODV Simulation area 1500*1500 Number of nodes 30 Communication range Default 50m Simulation time 20sec Speed of nodes 1.2 m/sec Begin INPUT: Encrypted Message 1: Assume source Node A sends message to Node I. 2: If Node I receives the message and forward to destination Node B. 3: Node I give acknowledgement to Node A. 4: Node B sends an acknowledgement to Node A and I Figure 4: Packet loss (2ACK). 5: Node A consider that message forwarded successfully 6: Else 7: If Node I sends an acknowledgement to Node A 8: Node B do not send acknowledgement to Node A 9: Node A classified to Node B as a misbehaving node in the Network 10: Else 11: If Node I does not send acknowledgement to Node A 12: If Node B does not send acknowledgement to Node A Figure 5: Delivery ratio 13: Then Node A classified as Node I as a misbehaving node in networks V. Conclusion: 14: End. A wormhole attack is an attack, executed by two IV. Simulation Environment and Analysis: unauthenticated nodes causing serious damage to data and indirectly networks reliability. Here, a solution is The proposed approach is implements with NS2 proposed to prevent the network against wormhole simulator. AODV protocol is used for routing attack. In this, Advanced Encryption Standard (AES) purpose. Mobile Ad-hoc networks of 30 nodes are algorithm is used for encryption and decryption of data created with the simulation area of 1500*1500 packets and 2ACK scheme is used to identify and prevent meter, other parameters are as shown in table: attacker nodes in network. Because of this, the only Table1: Simulation Parameters authentic node will remain in the network; unauthentic nodes (wormhole node) will be discarded. As a result, Parameters Values secure communication can take place only between the authenticated nodes. Communications Networking System , Vol 01, Issue 02, December 2012 ISSN: 2278-2427. [6] Shalini Jain and Dr.Satbir Jain, “Detection and prevention of wormhole attack in mobile adhoc networks”, International Journal of Computer VI. Theory and Engineering, Vol. 2, No. 1 February, ACKNOWLEDGEMENTS 2010. Authors of this paper would like to thank our College, SSBT’s COET Bambhori, Jalgaon, NMU University, Maharashtra, India, for providing us adequate resources to make this paper. Also, we would like to thank our project guide Mr. M. E. Patil and HOD Dr. G. K. Patnaik for their valuable suggestions. I. References: [1] Priyanka Sharma, H.P. Sinha and Abhay Bindal, “Detection and Prevention against Wormhole Attack in AODV for Mobile Ad-Hoc Networks”, International Journal of Computer Applications (0975 – 8887) Volume 95– No. 13, June 2014. [2] Pravin Khandare, Prof. N. P. Kulkarni, “Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack”, International Journal of Computer Trends and Technology- volume4, Issue3, 2013. [3] Manoj E. Patil and Kavita T. Patil , “Improve the Security of CGA using Adjustable Key Block Cipher based AES, to Prevent Attack on AES in IPV6 over MANET”, IEEE Global Conference on Wireless Computing and Networking (GCWCN) 2014. [4] Yashpalsinh Gohil, Sumegha Sakhreliya and Sumitra Menaria, “A Review On: Detection and Prevention of Wormhole”,International Journal of Scientific and Research Publications, Volume 3, Issue 2, February 2013 [5] P. Anitha and M. Sivaganesh, “DETECTION AND PREVENTION ATTACKS TRACING” IN OF MANETS International WORMHOLE USING Journal PATH of