This paper proposes a method to detect and isolate wormhole attacks in mobile ad hoc networks (MANETs). The main idea of this paper is to create many possible routes when sending Route Request (RREQ) from source to destination and to use those routes as reference of each other, in order to find malicious nodes with suspicious behavior within the network. The proposed method works in three steps, which are using routes redundancy, routes aggregation and calculating round-trip time (RTT) of all listed routes. Routes redundancy is started where source sends RREQ using every possible way to destination. All routes that connect source and destination are listed together with the number of hops from every route. Some routes gathered in the same relay point before destination is aggregated, so all nodes that join the network can be listed and the behavior of malicious nodes in can be detected. The RTT and number of hops of all listed routes are compared in order to detect suspicious route. Nodes with suspicious behavior within network are isolated and will not be considered for transmission. Simulation results shows the ability to prevent the increasing of packets dropped, based on wormhole isolation in our proposed scheme compare to normal AODV protocol and approach of previous time-based calculation.
展开▼