Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P42 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P42
A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks
Monika, Jyoti Thalor
Citation :
Monika, Jyoti Thalor, "A Novel Approach for Detection and Prevention of Wormhole Attack In Ad-hoc Networks," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1171-1176, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P42
Abstract
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. In this paper we specifically considering Tunnelling attack which does not require exploiting any nodes in the network and can interfere with the route establishment process. Wormhole attack is a network layer attack observed in MANET, which completely disrupts the communication channel. Instead of detecting suspicious routes, we suggest a new method which detects the attacker nodes and works without modification of protocol, using a hop-count analysis from the viewpoint of users without any special environment assumptions. The tunnelling attack is simulated using OPNET and proposed work showing the detection and isolation algorithm.
Keywords
Intrusion Detection, Mobile Ad hoc network security, Wormhole detection techniques, hop-count analysis, network security, Tunnelling attack.
References
1. Perkins,Charles E, “Ad- Hoc Networking”, AddisionWesley,2001.
2. Perkins C. and Royer E. “Ad hoc on-demand distance vector routing ,” In Proceedings of Second IEEE Workshop on Mobile Computing Systems and Applications, pp.90-100
3. Srdjan Capkun, L.evente Buttyan, and Jean-Pierre Hubaux, 2003 “SECTOR: Secure Tracking of Node Encouters in Multi-hop Wireless Networks,”In Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks (ACM SANS), pp. 21-32.
4. Yih-Chun Hu, Adrian Perrig, David B. Johnson, 2003 “Packet Leashes : A Defence against Wormhole Attacks in Wireless Networks”, Twenty-Second ANNUAL Joint Conference of IEEE Computer and Communications , pp. 267-279.
5. Lingxuan Hu and David Evans, Feb. 2004 “Using Directional Antennas to Prevent Wormhole Attack “,In Proceedings of the Network and Distributed System Security Symposium, pp. 131-141.
6. Chiu, HS; Wong Lui KS, 2006 “DELPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”,In Proceeding of International Symposium on Wireless Pervasive Computing, pp. 6-11.
7. Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, Nov. 2008 “Analysis of wormhole Intrusion Attacks In MANETS”,IEEE Military Communications Conference,MILCOM 2008.
8. Y.-C. Hu, A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, Security and Privacy Magazine IEEE V2I3 ,2004
9. R. S. Khainwar, A. Jain , J. P. Tyagi , Dec 2011 ,”Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm “ International Journal of Egineering Technology and Advanced Engineering, Volume 1, Issue 2, pp. 40-47.
10. Issa Khalil, Saurabh Bagchi, Ness B. Shroff.” LITEWORP: a Lightweight countermeasure for the wormhole attack in multihop wirelessnetworks”. In the proceedings of the international conference on dependable systems and networks (DSN’05); 2005.
11. Issa Khalil, Saurabh Bagchi, and Ness B. Shroff. MOBIWORP: mitigation of the wormhole attack in mobile multihop , wireless networks. In the IEEE securecomm and workshops; 2006.
12. Xia Wang, Intrusion detection techniques in wireless ad hoc networks. In the proceedings of the IEEE international computer software and applications conference; 2006
13. Xia Wang and Johnny Wong, An end-to-end detection of wormhole attack in wireless ad-hoc networks. In the proceedings of the 31st annual international computer software and applications conference (COMPSAC); 2007.
14. Hu Yih-Chnu, Perrig Adrian, Jonhson David B. Wormhole attacks in wireless networks.” IEEE Journal on Selected Areas in Communication2006”.
15. Lazos L, Poovendran R, Meadows C, Syverson P, Chang LW. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. “In the proceedings of the IEEE conference on wireless communications and networking; 2005”, vol. 2. pp. 1193–9.
16. F. Natt-Abdesselam, B. Bensaou, T. Taleb, “Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Network”, IEEE Communications Magazine, 46(4), pp. 127-133, 2008.
17. M.A. Gorlatva, P. C. Mason, M. Wang, L. Lamont, R. Liscano, “Detecting Wormhole attacks in Mobile A d Hoc Networks through Protocol Breaking and Packet Timing Analysis”, In IEEE Military Communications Conference, pp. 1-7 ,2000 18. Shalini Jain, Dr.Satbir Jain, “ Detection and prevention of wormhole attack in mobile adhoc networks” , In Proceedings of the International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010, pp.78-86.
19. Stallings W [2000], Network Security Essentials: Security Attacks. Prentice Hall. pp. 2-17.
20. M.S.Sankaran, S.Poddar, P.S. Das, S.Selvakumar “A Novel Security Model SaW: Security against Wormhole attack in Wireless Sensor Networks”, In Proceeding of International Conference on PDCN, 2009.
21. Khin Sandar Win “Analysis of Detecting Wormhole Attack in Wireless Sensor Networks”,World Academyof Science, Engineering and Technology, 2008,pp.422-428.
22. I.Khalil, S.Bagchi, N.B.Shroff, “A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks”, In Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN’05).
23. Maria Alexandrovna Gorlatova “Review of Existing Wormhole Attack Discovery Techniques” A Contractor report at DRDC Ottawa, pp. 1-23, August , 2006.
24. S.Choi, D.Kim , D. Lee, J. Jung “ WAP:Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Network “, In Proceeding International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, 2008, pp. 343348.
25. Guoxing Zhan, Weisong Shi, and Julia Deng, 2012 “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs” IEEE Transactions on Dependable and Secure Computing, Volume 9, Issue 2, pp.184-197.
26. H. Vu, A. Kulkarni, K. Sarac, N. Mittal. “WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks”. In Proceedings of International Confernce on Wireless Algorithms Systems and Applications, LNCS 5258, pp. 491-502, 2008.
27. On the Survivability of Routing Protocols in Ad Hoc Wireless Networks, A. Baruch, R. Curmola, C. Nita- Rotaru, D. Holmer, H. Rubens, Convergence on Security and Privacy for Emerging Areas Communications, Secure Comm 2005, September 2005.
28. Ritesh Maheshwari, Jie Gao and Samir R Das, “Detecting Wormhole Attacks in Wireless Networks Using Connectivity In-formation”, Department of Computer Science, Stony Brook University Stony Brook, NY 11794-4400, USA.