Detection and Elimination of Wormhole Attacks in a MANET

Authors

  • A. Vani Dept. of ECE, Chaitanya Bharathi Institute of Technology (Autonomous), Hyderabad, India

Keywords:

MANET, Routing, AODV, Wormhole attack, WARP

Abstract

Wormhole attacks in Mobile ad hoc networks is impermeable to traditional security measures. The attack can be launched regardless of the MAC, routing, or security protocol used in the network. Two or more malicious nodes in conspiracy usually perform the wormhole attack. Two malicious nodes at different locations send received routing messages to each other via a secrete channel. In this way, although the two malicious nodes are located far from each other, they appear to be within one-hop communications range. Wormhole nodes can successfully execute such attacks without compromising any computer, and are inevitable even though some ad hoc wireless networks provide authenticity and confidentiality protection. Practically all widespread security extensions are proposed for popular routing protocols but they do not alleviate wormhole attacks. However, since wormhole attack such a severe thread to MANET security. In this situation wormhole attack methodology presented is motivated by WARP and the same procedure and terminology is used but slight modification In this work wormhole attack is detected and eliminated by simply modifying AODV routing protocol and its performance is measured.

 

References

Hu Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks," in In Proce. of IEEE INFOCOM, 2003.

H. Yih-Chun, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks," Selected Areas in Communications, IEEE Journal on, vol. 24, no. 2, pp. 370-380, 2006.

S. Capkun, L. Buttya`n, and J.-P. Hubaux, “Sector: secure tracking of node encounters in multi-hop wireless networks," in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks. Fairfax, Virginia: ACM, 2003, 986862 21-32.

L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks," in Network and Distributed System Security Symposium (NDSS), San Diego, 2004.

I. Khalil, S. Bagchi, and N. B. Shroff, “Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 16. 51, no. 13, pp.3750-3772, 2007, 1276793.

I. Khalil, S. Bagchi, and N. B. Shroff, “Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Netw., vol. 6, no. 3, pp. 344-362, 2008, 1328997.

L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput. Appl.,vol. 30, no. 1, pp. 308-330, 2007.

R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information," in INFOCOM 2007. 26th IEEE Internation2.4.1.1al Conference on Computer Communications. IEEE, J. Gao, Ed., 2007, pp.107-115 .

X. Su and R. V. Boppana, “On mitigating in-band wormhole attacks in mobile ad hoc networks," in Communications, 2007. ICC `07. IEEE International Conference on, R. V. Boppana, Ed., 2007, pp. 1136-1141.

H. Vu, A. Kulkarni, K. Sarac, and N. Mittal, “Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks," in In Proc. of the Third International Conference on Wireless Algorithms, Systems, and Applications, 2008.

X. Wang and J. Wong, “An end-to-end detection of wormhole attack in wireless ad-hoc networks," in In Proc. of International Conference on Computer Software and Applications, 2007.

Ning Song, Lijun Qian, and Xiangfang Li. Wormhole attacks detection in wireless IEEE international parallel and distributed processing symposium (IPDPS’05); 2005.

Hon Sun Chiu, King-Shan Lui. DelPHI: wormhole detection mechanism for ad hoc wireless networks. In the proceedings of the 1st international symposium on wireless pervasive computing; 2006.

P. Dhivya and S. Meenakshi, "A Review of Congestion Control Techniques in Mobile Ad-hoc Network", International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.44-49, 2015.

G.Kalpana and S.Archana, "Performance Analysis of Threshold Based Algorithms under Wormhole Attack in MANET", International Journal of Computer Sciences and Engineering, Vol.3, Issue.7, pp.133-138, 2015.

Ming-Yang Su “WARP: A Wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks”, COMPUTERS & SECURITY 29 (2010) 208-224.

Mahesh K.Marina and Samir R.Das., “On-demand multipath distance vector routing in ad hoc networks”, In the proceedings of the IEEE international conference on network protocols(ICNP);2001.pp.14-23.

Downloads

Published

2017-10-30

How to Cite

[1]
A. Vani, “Detection and Elimination of Wormhole Attacks in a MANET”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 5, pp. 35–40, Oct. 2017.

Issue

Section

Research Article

Similar Articles

1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.