An Approach to Detect Wormhole Attack in Mobile Ad Hoc Networks Using Direct Trust Based Detection Approach


  • Shruti Thapar Electronics and Communication, (Asst. Prof.), PIET, Jaipur, (RTU,KOTA), Jaipur, Rajasthan ,India
  • Amol Purohit Electronics and Communication, (Asst. Prof.), Sree Dattha Institute of Engineering and Science, Hyderabad ,India
  • Budesh Kanwer Artificial Intelligence and Data Science, (Prof.), PIET, Jaipur, (RTU,KOTA), Jaipur,Rajasthan ,India
  • Akash Jaiman Computer Science Engineering, (Asst. Prof.), PIET, Jaipur, (RTU,KOTA), Jaipur,Rajasthan ,India
  • A. Mounika Computer Science Engineering, (Asst. Prof.), Sree Dattha Group of Institutions, Hyderabad ,India
  • V. S. Madhumala Computer Science Engineering, (Asst. Prof.), Sree Dattha Group of Institutions, Hyderabad ,India


MANET, Wormhole Attacks, Jellyfish Attack, Routing Protocols, Performance Metric


Mobile ad hoc organization is used in numerous applications climate strategic projects or standard gadget organization. The reason toward the rear of the developing acknowledgment of magnets is the simple accessibility of compact gadgets. The versatile Ad Hoc Network isn't simply smooth to introduce yet notes might be presented or eliminated powerfully shape it. Besides, the local area doesn't need a proper foundation. The above expressed make magnet exceptionally reasonable in various bundles however at the expense of raised weakness to Cyber-assaults. The greatest imperative attacks in Manet are wormhole attack and jellyfish assault. The writing needs inside the methods that could endless supply of these assaults simultaneously. In this examination we've proposed a coordinated strategy that is equipped for stagger on both wormhole and jellyfish assault the utilization of indistinguishable boundaries.


Download data is not yet available.


International conference on recent cognizance in wireless communication & image processing “A Review on Performance Evaluation of Routing Protocols in MANET” (December’2014), PUBLISHED IN SPRINGER 2015 EDITION.

Ahmed, Diaa Eldein & Khalifa, Othman, “An Overview of MANETs: Applications, Characteristics, Challenges, and Recent Issues,” International Journal of Engineering and Advanced Technology (IJEAT) ISSN, pp. 2249 – 8958, 2017.

Shruti Thapar and Sudhir Kumar Sharma, “Analysis of Isolation access of Wormhole Attack in Mobile Ad hoc Network using Delay Prediction Technique”, International journal of Advanced Science and Technology (IJAST), ISSN: 2005-4238 IJAST, volume-29 issue-6, 2020, page no.- 9401-9411.

W. A. Aliady and S. A. Al-Ahmadi, "Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks," in IEEE Access, vol. 7, pp. 84132-84141, 2019.

Shruti Thapar and Sudhir Kumar Sharma, “Study of Direct Trust Based Detection Algorithm for Prohibiting Jellyfish Attack in MANET”, ILKOGRETIM Online, doi: 10.17051/ ilkoline.2021.04.234, volume 20 issue 4, 2021, page no. -2052-2057.

Azer, M. & El-Kassas, Sherif & El-Soudani, Magdy, “A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks,” 2009.

Shruti Thapar, M Venu Gopala Rao, Babita Jain, Rajkumar Kaushik, “A Secure Routing for MANET using Internet of Things”, International Journal of Early Childhood Special Education (INT-JECSE)DOI:10.9756/INTJECSE/V14I5.305 ISSN: 1308-5581 Vol 14, Issue 05 2022, pp. 2957-2965.

V. Krundyshev, M. Kalinin and P. Zegzhda, "Artificial swarm algorithm for VANET protection against routing attacks," 2018 IEEE Industrial Cyber- Physical Systems (ICPS), pp. 795-800, 2018.

Shruti Thapar, M Venu Gopala Rao, Babita Jain, Rohan Sharma , “Research Article on Routing Protocols for MANET: A Review”, International Journal of Early Childhood Special Education (INT-JECSE)DOI:10.9756/INTJECSE/V14I5.305 ISSN: 1308-5581 Vol 14, Issue 05 2022, pp 2939-2949.

S. Sachdeva and P. Kaur, "Detection and analysis of Jellyfish attack in MANETs," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, pp. 1-5, 2016.

S. Doss et al., "APD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET," in IEEE Access, vol. 6, pp. 56954-56965, 2018.

J.Dromard, R. Khatoun, L.Khoukhi, “A watchdog extension scheme considering packet loss for a reputation system in wireless mesh network,” In: 20th International Conference on Telecommunications (ICT 2013). Casablanca, Morocco, pp 1–5, 2013.

Capkun S, Buttyán L, and Hubaux JP SECTOR “secure tracking of node encounters in multi-hop wireless networks” In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks

(in association with 10th ACM conference on computer and communications security) Fairfax, VA, United States, 2003.

Dias JA, Rodrigues JJ, Xia F, Mavromoustakis CX, “A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks” IEEE Trans Ind Electron, pp. 7929–7937,


Biswas J, Gupta A, and Singh D WADP, “a wormhole attack detection and prevention technique

in MANET using modified AODV routing protocol” In: Arya KV, Sunil Kumar (Eds) 9th international conference on industrial and information systems (ICIIS2014) IEEE, Piscataway, New Jersey, 2014.

Liu X, Chen S, Song W, “A design and implementation of watchdog based on observer pattern and finite state machine,” In: Proceedings of the 10th IEEE International Conference on

Reliability, Maintainability and Safety (ICRMS ’14), pp 407–411, 2014.

Patel MM, Aggarwal A, “Two phase wormhole detection approach for dynamic wireless sensor networks,” In Proceedings of the IEEE international conference on wireless communications, signal processing and networking (WiSPNET ’16) IEEE,Chennai, India, 2016.

Su MY WARP, “A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”. Comput Secur, pp. 208–224, 2010.

Aad and J.P. Hubaux, E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,”

IEEE/ACM Transactions on Networking, vol.16, pp.791- 802, Aug.2008.

Wazid, Mohammad & Katal, Avita & Goudar, R.H., “Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack,” Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing. Pp. 435-440, 2012

Wazid, M., Katal, A. Goudar, R. H., “Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack,” in Proceedings of 2nd IEEE international conference on parallel, distributed and grid computing , pp. 435– 440, 2012.

M. Kaur, M. Rani and A. Nayyar, "A novel defense mechanism via Genetic Algorithm for counterfeiting and combating Jelly Fish attack in Mobile Ad-Hoc Networks," 5th International Conference -Confluence The Next Generation Information Technology Summit (Confluence), Noida, pp.359-364, 2014.

Jayasingh, Bipin & Swathi, “Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network,” BVICAM's International Journal of Information Technology, 2010.

Ramesh, A. &Suruliandi, “A Performance analysis of encryption algorithms for Information Security,” pp. 840-844, 2013.

S. K. A. and Abha Jadaun. “Design and Performance Assessment of Light Weight Data Security System for Secure Data Transmission in IoT”, Journal of Network Security, 2021, Vol-9, Issue-1, PP: 29-41.

Pratiksha Mishra and S. K. A. “Design & Performance Assessment of Energy Efficient Routing Protocol Using Improved LEACH”, International Journal of Wireless Network Security, 2021, Vol-7, Issue-1, PP: 17-33.

S. K. A., Prakash Dangi and Pratiksha Mishra. Design and Comparison of LEACH and Improved Centralized LEACH in Wireless Sensor Network. IJRITCC 2021, 9, 34-39.

S. K. A., M. K. M, and P. Singh "A Security Approach to Manage a Smart City's Image Data on Cloud," AI-Centric Smart City Ecosystems: Technologies, Design and Implementation (1st ed.), PP: 68-82, (2022). CRC Press.

S. K. A. "A. Raj, V. Sharma, and V. Kumar.“Simulation and Analysis of Hand Gesture Recognition for Indian Sign Language Using CNN”." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 4 (2022): 10-14.

Frame of Wormhole attack




How to Cite

S. . Thapar, A. . Purohit, B. . Kanwer, A. . Jaiman, A. . Mounika, and V. S. . Madhumala, “An Approach to Detect Wormhole Attack in Mobile Ad Hoc Networks Using Direct Trust Based Detection Approach ”, Int J Intell Syst Appl Eng, vol. 11, no. 6s, pp. 276–283, May 2023.



Research Article