Wormhole Attack Research Papers - Academia.edu (original) (raw)

The ubiquity and ease of operation have made wireless networks extremely popular. The Downfall of such popularity is the increased attacks on Mobile Ad-hoc Networks (MANET). The attack studied in this paper is wormhole attack. The choice... more

The ubiquity and ease of operation have made wireless networks extremely popular. The Downfall of such popularity is the increased attacks on Mobile Ad-hoc Networks (MANET). The attack studied in this paper is wormhole attack. The choice of attack was based on the difficulty in identifying and mitigating the attack in real life scenarios. We used AODV protocol for the simulation; the most popular routing protocol used for small-scale networks. Wormhole attack is a potential threat to MANETs; it involves using a two-node system to route packets through a ‘tunnel’ created by the nodes. The attack enables the attacker to manipulate packet traffic, while making it difficult for an Intrusion Detection System (IDS) to detect.

A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a self-configuring network. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The intermediate nodes... more

A mobile ad hoc network is a wireless network in which no infrastructure is available. MANET is a self-configuring network. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The intermediate nodes cooperate with each other as there is no such base station or access point. The routing protocols play important role in transferring data. Cryptographic mechanisms are used in routing protocols to secure data packets while transmitted in the network. But cryptographic techniques incur a high computational cost and can’t identify the nodes with malicious intention. So, employing cryptographic techniques in MANET are quite impractical as MANETs have limited resource and vulnerable to several security attacks. Trust mechanism is used as an alternative to cryptographic technique. Trust mechanism secures data forwarding by isolating nodes with malicious intention using trust value on the nodes. In this paper we survey different trust based protocols of MANET and compare their performances.

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node... more

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad

A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic topology, rapid deployment... more

A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic topology, rapid deployment practices, and the hostile environments in which they may be deployed, make MANET vulnerable to a wide range of security attacks and Wormhole attack is one of them. During this attack a malicious node captures packets from one location in the network, and tunnels them to another colluding malicious node at a distant point, which replays them locally. This paper presents a cluster based Wormhole attack avoidance technique. The concept of hierarchical clustering with a novel hierarchical 32-bit node addressing scheme is used for avoiding the attacking path during the route discovery phase of the DSR protocol, which is considered as the under lying routing protocol. Pinpointing the location of the wormhole nodes in the case of exposed attack is also given by using this method.

A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without... more

A Wireless Networks are more accessible to different types of attack than wired Network. One such attack is Wormhole Attack, in which traffic is forwarded and replayed from one location to another through the Wormhole tunnel without negotiating any cryptographic techniques over the network. Thus, it is challenging to defend against this attack. In this paper we review WSN concept and Wormhole Attack. Then we discuss classification of wormhole Attack and also mention few of the initiatives to detect the Wormhole Attack.

Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication.... more

Wireless communication technique has become an important tool in any application that requires communication between one or more senders and multiple receivers. Security is becoming a major concern for this wireless communication. Wireless sensor networks consist of a large number of small sensor nodes that constantly monitors environmental conditions but due to the partial resources of the nodes and hostile & pervasive environments. so this kind of nature of wireless sensor networks make them very attractive to attacks at all network layers; however, the so-called “wormhole attack”. In wormhole an attacker receives packets at one point in the network, “tunnels” them to another point in the network, and then replays them into the network from that point. In this paper, we will study wormhole attack and some of the methods for detecting of wormhole attack.

Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate... more

Today’s Mobile Ad hoc Networks (MANETs) became a popular issue for scientists, and diverse studies have been made to increase the performance of ad hoc networks. In MANET nodes compromise to forward packets for each other communicate beyond their transmission range. The mobile nodes communicate with each other without any infrastructure. As wireless ad-hoc networks lack an infrastructure, they are exposed to a lot of attacks. One of these attacks called Wormhole Attack that two adversary node collaborate together to transmit the packets in out of band channel. In this paper, performance of Ad hoc on-Demand Distance Vector (AODV) Protocol and Dynamic Source Routing (DSR) protocol are evaluated in presence of wormhole attack and without wormhole attack with Constant Bit Rate (CBR) traffic under dissimilar scalable network mobility. Also we evaluate effect and compare it with standard protocol in term of Packet Delivery Ratio, throughput and End to End Delay via simulation, using Network Simulation2 (NS2) for our research.

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and... more

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. Because of some flaws of adhoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks
in comparison with the wired network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it two another attacker at a distant location through tunnels which is established through different ways like packet
encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality.
By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured
mechanism for wormhole detection and prevention. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with its available counter measures in ad-hoc wireless network.

Wireless sensor networks (WSNs) have inspired many applications such as military applications, environmental monitoring and other fields. WSN has emergence in various fields, so security is very important issue for sensor networks.... more

Wireless sensor networks (WSNs) have inspired many applications such as military applications, environmental monitoring and other fields. WSN has emergence in various fields, so security is very important issue for sensor networks. Security comes from attacks. Due to the wireless and distributed nature anyone can connect with the network. Among all possible attacks, wormholes are very hard to detect because they can cause damage to the network without knowing the protocols used in the network. It is a powerful attack that can be conducted without requiring any cryptographic breaks. Wormholes are hard to detect because they use a private, out-of-band channel invisible to the underlying sensor network. In this paper a wormhole detection protocol is proposed that is based on neighbourhood and connectivity information. Performance analysis shows that the proposed approach can effectively detect wormhole attack with less storage cost.

MANET is a collection of mobile hosts with wireless network interfaces that form a temporary network without any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic... more

MANET is a collection of mobile hosts with wireless network interfaces that form a temporary network
without any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of
centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack
due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avoiding
and preventing the wormhole attacks in MANET using statistical analysis approach. Simulation results
shows that proposed algorithm provides better security and performance in the presence of wormhole
attack than conventional AODV.

As a network provides the information sharing among public and private users, It increases the communication criticalities. The criticalities are identified in terms of associated attacks. These attacks are performed by internal or... more

As a network provides the information sharing among public and private users, It increases the communication criticalities. The criticalities are identified in terms of associated attacks. These attacks are performed by internal or external users to give information loss or to reveal the communicating information. To take the significant decision about communication approach, it is required to identify the associated attacks at early stage. In this present work, a study on the network attacks is defined. The paper has discussed type of security attacks that a network suffers. In this paper, some of the common network attacks are explained in detail.

Tentu kalian pernah mendengar apa itu wormhole atau lubang cacing yang sampai sekarang masih belum terpecahkan. Dalam ilmu fisika, wormhole atau lubang cacing adalah suatu hipotesa topologi masa depan dari ruang waktu dimana esensinya... more

Tentu kalian pernah mendengar apa itu wormhole atau lubang cacing yang sampai sekarang masih belum terpecahkan. Dalam ilmu fisika, wormhole atau lubang cacing adalah suatu hipotesa topologi masa depan dari ruang waktu dimana esensinya adalah jalan pintas yang melewati ruang dan waktu. Sejumlah ahli fisika terkemuka pernah berasumsi bahwa kuatnya gravitasi wormhole sudah cukup membuat moda transportasi yang tak terlalu canggih mampu melaju dengan kecepatan di atas kecepatan cahaya. Sehingga secara teoritis perjalanan antar galaksi yang sangat berjauhan bisa diselesaikan dengan waktu yang cukup singkat. Sebuah lubang cacing setidaknya mempunyai dua ujung lorong yang akan menghubungkan satu saluran. Jika lubang cacing bersifat traversable. Maka, sesuatu dapat melakukan perjalanan dari ujung lorong satu ke ujung lorong yang lain melalui saluran ini.

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records... more

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunately, the wormhole attack can hardly be defeated by crypto graphical measures, as wormhole attackers do not create separate packets. They simply replay packets already existing on the network, which pass the cryptographic checks. Existing works on wormhole detection have often focused on detection using specialized hardware, such as directional antennas, etc. In this paper, we present a cluster based counter-measure for the wormhole attack, that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Simulation results on MATLab exhibit the effectiveness of the proposed algorithm in detecting wormhole attacks.

Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. Any node in mobile... more

Mobile Ad hoc Networks (MANETs) are prone to a variety of attacks due to their unique characteristics such as dynamic topology, open wireless medium, absence of infrastructure, multi hop nature and resource constraints. Any node in mobile ad hoc networks operates not only as end terminal but both as an intermediate router and client. In this way, multi-hop communication occurs