Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach (original) (raw)

Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach

19th IEEE International Parallel and Distributed Processing Symposium

Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature. However, the effects of routing attacks on multi-path routing have not been addressed. In this paper, the performance of multi-path routing under wormhole attack is studied in detail. The results show that multi-path routing is vulnerable to wormhole attacks. A simple scheme based on statistical analysis (called SAM) is proposed to detect such attacks and to identify malicious nodes. Comparing to the previous approaches (for example, using packet leash), no special requirements (such as time synchronization or GPS) are needed in the proposed scheme. Simulation results demonstrate that SAM successfully detects wormhole attacks and locates the malicious nodes in networks with different topologies and with different node transmission range. Moreover, SAM may act as a module in local detection agents in an intrusion detection system (IDS) for wireless ad hoc networks.

Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path

IEEE Wireless Communications and Networking Conference, 2005

The application of multi-path techniques in wireless ad hoc networks is advantageous because multi-path routing provides means to combat the effect of unreliable wireless links and constantly changing network topology. In this paper, the performance of multi-path routing under wormhole attack is studied in both cluster and uniform network topologies. Because multi-path routing is vulnerable to wormhole attacks, a scheme called Statistical Analysis of Multi-path (SAM) is proposed to detect such attacks and to identify malicious nodes. As the name suggests, SAM will detect wormhole attacks and identify attackers by statistically analyzing the information collected by multi-path routing. Neither additional security services or systems nor security enhancement of routing protocols is needed in the proposed scheme. Simulation results demonstrate that SAM successfully detects wormhole attacks and locates the malicious nodes in networks with cluster and uniform topologies and with different node transmission range.

Detection and Prevention of Wormhole Attacks in MANETs using Path Tracing Approach

Wireless ad-hoc network is a set of independent mobile nodes that communicates through a wireless link. Due to open medium and lack of centralized authority, ad-hoc networks are susceptible to numerous routing attacks. A wormhole attack causes severe threat to ad hoc networks and disrupts the entire communication process. If the source node chooses the route which contains malicious node, then they have much high probability of packet dropping. In this paper, we propose Path Tracing (PT) algorithm for detection and prevention of wormhole attack as an extension of DSR protocol. The PT algorithm runs on each node in a path during the DSR route discovery process. It calculates per hop distance based on the RTT value and wormhole link using frequency appearance count. Every node in a path has to compute per hop distance of its neighbor with the previous per hop distance to identify the wormhole attack. The corresponding node detects the wormhole if per hop distance exceeds the maximum threshold range. In the routing process, the wormhole link participates in more number than the normal link. This factor is used to detect the wormhole link using a link frequent appearance count. A network simulator (NS-2) results prove that the proposal detects the wormhole attack more effectively.

TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks

2007

Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks -one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.

An Efficient Approach for Detection of Wormhole Attack in Mobile ad-hoc Network

International Journal of Computer Applications, 2014

Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired resolution network. MANET nodes are typically well known by their precise power, transformation, and memory effects as well as high degree of mobility. In MANET mobile node is responsible for route establishment using wireless link where each node behave like both as a host and router. In such networks, the wireless mobile nodes may dynamically enter the network as well as go-ahead the network. Mobile ad hoc network is a group of many more devices or nodes with the capability of communication and networking. MANET encounter by number of security threat because of its open entrusted environment with little security settlement, even if security over MANET is not to be enhance up to satisfactory level because of its characteristics Security is an essential service for wired and wireless network communication. Due to its mobility and self routing effective nature, there are many deficiencies in its security. Various security threats show their impact at different layers, Among all of security thread worm hole is consider to be a very serious security thread over MANET. In wormhole two selfish node which is geographically very far away to each other, makes tunnel between each other to cover their actual location and try to believe that they are true neighbors and makes conversation through the wormhole tunnel. Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. For wormhole attack to have a best impact on the wired or wireless network, it must fascinate a huge amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem of wormhole attack.

IJERT-Techniques For Detection & Avoidance Of Wormhole Attack In Wireless Ad Hoc Networks

International Journal of Engineering Research and Technology (IJERT), 2012

https://www.ijert.org/techniques-for-detection-avoidance-of-wormhole-attack-in-wireless-ad-hoc-networks https://www.ijert.org/research/techniques-for-detection-avoidance-of-wormhole-attack-in-wireless-ad-hoc-networks-IJERTV1IS10389.pdf A Wireless Networks due to their open nature has different set of attacks than Wired Networks and thereby, requires different steps to counter these attacks as compared to that in conventional networks. One such attack in wireless ad hoc networks is Wormhole Attack. In this Attack, wireless transmissions are recorded at one location and replayed them at another location thereby creating virtual tunnel in a network which is controlled by attacker. This attack can be mounted on wide range wireless ad hoc networks without compromising any cryptographic quantity over network. Thus it is one of the most sophisticated and severe attack and is particularly challenging to defend against. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem.

Wormhole attack detection techniques in ad-hoc network: A systematic review

Open Computer Science

Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing W...

Techniques For Detection & Avoidance Of Wormhole Attack In Wireless Ad Hoc Networks

2012

A Wireless Networks due to their open nature has different set of attacks than Wired Networks and thereby, requires different steps to counter these attacks as compared to that in conventional networks. One such attack in wireless ad hoc networks is Wormhole Attack. In this Attack, wireless transmissions are recorded at one location and replayed them at another location thereby creating virtual tunnel in a network which is controlled by attacker. This attack can be mounted on wide range wireless ad hoc networks without compromising any cryptographic quantity over network. Thus it is one of the most sophisticated and severe attack and is particularly challenging to defend against. This Paper focuses on threat that wormhole attack possesses on network and also mentions few of the initiatives with their respective specifications to solve the problem.

Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks

International Conference on Systems and Networks Communications, 2009

Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one

A Comparative Analysis of Detection and Prevention of Wormhole Attacks in Mobile Ad-hoc Networks

In day to day life the Computer Networks Becomes more popular especially Mobile Ad hoc Networks. Its applicability and popularity attracts some miss users for malfunctioning and disturbing the network traffic. The ad-hoc networks are the temporarily established wireless networks for doing specific task, which do not require fixed Infrastructure. Each mobile node functions as base station and as router forwarding packets for other mobile nodes in network. There are various types of attacks in Mobile networks but among all attacks wormhole attack is most dangerous attack. In this attack an attacker capture the packets at one node in the network and send it to the another attacker node at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. By Using a cryptographic technique is not enough to prevent wormhole attack. In this paper we are going to Comparative Analysis of Detection and prevention techniques of Wormhole attacks trying to find out their pros and cons.