Advanced Wormhole Attack Detection Through Tri-Phase Resilient Approach (Tr-Wadm)
Keywords:
Mobile Ad-Hoc Network (MANET),Wormhole Attack, Routing protocol, Grey hole AttackAbstract
The proposed method for detecting wormhole attacks in network environments is a robust three-stage approach designed to enhance network security. In Stage 1, agents are generated, tested, and broadcasted throughout the network to monitor activities, collect data, and identify anomalies, ensuring broad coverage and effective data gathering. Stage 2 focuses on the agents' lifecycle, including their role in handling events and detecting malicious nodes. During this stage, agents continuously assess network events and node trustworthiness based on predefined criteria, identifying and reducing trust in suspicious nodes. Finally, Stage 3 utilizes the insights gained from the previous stages to detect and prevent wormhole attacks. By analyzing collected data for abnormal patterns, the system implements measures to prevent traffic from being routed through compromised nodes, thereby maintaining network integrity and stability. This multi-stage approach ensures comprehensive monitoring, accurate detection, and effective prevention of wormhole attacks.