sis 18: e12

Research Article

A lightweight technique for detection and prevention of wormhole attack in MANET

Download86 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.165515,
        author={Zulfiqar Ali Zardari and Kamran Ali Memon and Reehan Ali Shah and Sanaullah Dehraj and Iftikhar Ahmed},
        title={A lightweight technique for detection and prevention of wormhole attack in MANET},
        journal={EAI Endorsed Transactions on Scalable Information Systems: Online First},
        keywords={MANET, Denial of service, Wormhole attack, Average sequence number, Reply (RREP) packet},
  • Zulfiqar Ali Zardari
    Kamran Ali Memon
    Reehan Ali Shah
    Sanaullah Dehraj
    Iftikhar Ahmed
    Year: 2020
    A lightweight technique for detection and prevention of wormhole attack in MANET
    DOI: 10.4108/eai.13-7-2018.165515
Zulfiqar Ali Zardari1, Kamran Ali Memon2,*, Reehan Ali Shah3, Sanaullah Dehraj4, Iftikhar Ahmed5
  • 1: Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
  • 2: School of Electronic Engineering, Beijing University of Posts & Telecommunications, Beijing, China
  • 3: Department of computer system Engineering, faculty of Engineering, The Islamia University Bahawalpur, Pakistan
  • 4: Department of Mathematics and Statics, Quaid e Awam University of Engineering, Science and Technology, Nawabshah, Pakistan
  • 5: School of Computer science, Beijing Institute of Technology, China
*Contact email:


A mobile ad-hoc network (MANET) is an ordinary and self-orbiting communication network that is capable of managing mobile nodes. Many proposed protocols on MANET address its vulnerability against different threats and attacks. The malicious node exploits these vulnerabilities to lunch attacks, especially when nodes have mobility and network do not have constant topology, like wormhole attack. This paper presents a lightweight technique that detects the wormhole attacks in MANET. In the proposed technique, the source node calculates the average sequence number of the reply (RREP) packets. If the sequence number of the corresponding node exceeds the calculated average value of the sequence number, then all traffic is discarded, and the node is marked as malicious. The proposed technique is less complex, power-efficient, and enhances network lifetime as more data packets are delivered to the destination node. This technique is validated through comprehensive simulations results in NS2.