Analysis of wormhole Intrusion Attacks in MANETs

Authors

  • Deepthi V S  Research Scholar, VTU RRC, Assistant Professor, Department of ISE, GAT, Bangalore, India
  • Dr. Vagdevi S  Prof & Head, Department of EEE, GSSSIETW, Mysuru, Karanataka, India

Keywords:

Security, MANET, Wormhole attack, Wormhole detection technique, Wormhole prevention, classification

Abstract

Security of different networks has always been a primary concern as its necessary to protect the resources being shared and communication being done among the legitimate users. If we let down our safeguards, an attacker can transform the routing protocol and interrupt the network operations through mechanisms such as packet drops, flooding, data fabrication etc. MANET is a type of network whose dynamic topology, decentralizing governance and other such features are always in favour of many security attacks. This paper presents detail study of wormhole attack, algorithms to detect them that has been proposed so far and also directs the reader toward the areas that can be explored and work upon in future.

References

  1. S Ci et al., “Self-Regulating Network Utilization in Mobile AdHoc Wireless Networks,” IEEE Trans. Vehic.Tech., vol. 55, no. 4, July 2006, pp. 1302–10.
  2. Y-C. Hu, A. Perrig, D. B. Johnson, “Wormhole Attacks in Wireless Networks, Selected Areas of Communications,” in IEEE Journal on, vol. 24, no. 2, pp.370-380, 2006.
  3. V Mahajan, M. Natu “Analysis of wormhole intrusion attacks in MANETS”, In IEEE Military Communications Conference (MILCOM), 2008.
  4. HS. Chiu and K. Lui. “Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, 2006.
  5. R Maulik, N. Chaki. “A Comprehensive Review on Wormhole Attacks in MANET”. In 9th International Conference on Computer Information Systems and Industrial Management Applications, 2010.
  6. Khin Sandar Win, Pathein Gyi, “Analysis of Detecting Wormhole Attack in Wireless Networks,” in World Academy of Science, Engineering and Technology 48, pp. 422-428, 2008.
  7. YC. Hu, A. Perrig, and D.B. Johnson. “Packet leashes: A defenseagainst wormhole attacks in wireless ad-hoc networks,” Proceedings of 22nd IEEE INFOCOM, pp. 1976-86, Apr. 2003.
  8. L Hu and D. Evans. “Using directional antennas to prevent wormhole attacks,” Proceedings of Network and Distributed System Security Symposium, pp. 131-41, Feb. 2004.
  9. I Khalil, S. Bagchi, and N.B. Shroff. “LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” Proceedings of the International Conference on Dependable Systems and Networks, pp. 612-41, 2005.
  10. W. Weichao, B. Bharat, Y. Lu, and X. Wu. “Defending against wormhole attacks in mobile ad-hoc networks,” Wireless Communication and Mobile Computing, vol. 6, no. 4, pp 483-503, 2006.
  11. J. Eriksson, S. Krishnamurthy, and M. Faloutsos. “Truelink: Apractical countermeasure to the wormhole attack,” International Conference on Network Protocols, pp.75-84, Nov. 2006.
  12. P.V. Tran, L.X. Hung, Y.K. Lee, S. Lee, and H. Lee. “TTM: An efficient mechanism to detect wormhole attacks in wireless adhoc networks,” 4th IEEE Consumer Communication and Networking Conference (CCNC’07), pp. 593-8, May 2007.
  13. K.B. Rasmussen and S. Capkun. “Implications of radio fingerprinting on the security of sensor networks,” Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331-40, Sep. 2007.
  14. S. Özdemir, M. Meghdadi, and I. Güler. “A time and trust basedwormhole detection algorithm for wireless sensor networks,” (manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC’08), pp. 139-4, 2008.
  15. I. Khalil, S. Bagchi, and N.B. Shroff. “MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks,” Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344-62, 2008.
  16. R. Venkataraman, M. Pushpalatha, T.R. Rao, and R. Khemka. “A graph-theoretic algorithm for detection of multiple wormhole attacks in mobile ad-hoc networks,” International Journal of Recent Trends in Engineering, vol. 1, no. 2, May 2009.
  17. R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.P. Hubaux. "A practical secure neighbor verification protocol for wireless sensor networks,” ACM WiSec, 2009.
  18. H. Chen, W. Lou, and Z. Wang. “Conflicting-set-based wormhole attack resistant localization in wireless sensor networks,” Book Chapter Lecture Notes in Computer Science – Ubiqitous Intelligence and Computing, vol. 5585/2009, pp. 296-309, 2009.
  19. H. Chen, W. Lou, X. Sun, and Z. Wang. “A secure localization approach against wormhole attacks using distance consistency,” EURASIP Journal on Wireless Communication and Networking- Special Issue on Wireless Network Algorithms, Systems, and Applications, pp. 22-32, 2010.
  20. R. Graaf, I. Hegazy, J. Horton, and R. Safavi-Naini. Distributed “Detection of wormhole attacks in wireless sensor networks,” Springer book chapter Ad Hoc Networks, vol. 28, pp. 208-22, 2010.
  21. D.B. Roy, R. Chaki, N. Chaki. "A New Cluster-based Wormhole Intrusion Detection Algorithm for Mobile Adhoc Networks", IJNSA, 1 (1), pp. 44-52, 2009
  22. H.S. Chiu and K. Lui. “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”. In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.
  23. Dhara Buch, Devesh Jinwala, “Detection of Wormhole Attacks in Wireless Sensor Networks”, IEEEConference on Advances in Recent Technologies in Communication and Computing, pp 714, 2011.
  24. M.S. Sankaran, S. Poddar, P.S. Das, S. Selvakumar. “A Novel Security model SaW: Security against Wormhole attack in Wireless Sensor Networks”. In Proceedings of International Conference on PDCN, 2009.
  25. H. Vu, A. Kulkarni, K. Sarac, N. Mittal. “WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks”. In Proceedings of International Confernce on Wireless Algorithms Systems and Applications, LNCS 5258, pp. 491-502, 2008.
  26. F. Nait-Abdesselam, B. Bensaou, T. Taleb. “Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks”, IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.
  27. N. Song, L. Qian, X. Li. “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach”. In Proceedings of the 19th IEEE International Parallel and DistributedProcessing Symposium, 2005.
  28. Khin Sandar Win. “Analysis of Detecting Wormhole Attack in Wireless Networks”, World Academy ofScience, Engineering and Technology, 48, pp. 422-428, 2008.
  29. S. Choi, D. Kim, D. Lee, J. Jung. “WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks”. In International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.
  30. Dhara Buch, Devesh Jinwala, “Detection of Wormhole Attacks in Wireless Sensor Networks”, IEEEConference on Advances in Recent Technologies in Communication and Computing, pp 714, 2011.

Use the Rubik's Cube solver here and it will fix your scrambled puzzle for you! Just set the scrambled colors and let the program find the solution for you.

Downloads

Published

2018-05-08

Issue

Section

Research Articles

How to Cite

[1]
Deepthi V S, Dr. Vagdevi S, " Analysis of wormhole Intrusion Attacks in MANETs, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 6, pp.1034-1040, May-June-2018.