Escolar Documentos
Profissional Documentos
Cultura Documentos
ABSTRACT
Due to the nature of wireless transmission medium, Mobile Ad-Hoc Networks (MANET) have more number of security issues
compared to wired networks. Among all the security issues, wormhole attack is observed to be a very serious security threat
over MANET and it is type of a network layer attack. In this attack, two selfish nodes which are geographically very far away
from each other form a tunnel between each other to hide their actual location in the network and try to believe that they are
true neighbors in the network and therefore make communication through the wormhole tunnel. Consequently, the two selfish
nodes will completely interrupt the communication channel.
The aim of this research work is to develop a new model for wormhole detection is developed which is based on localization
technique with polynomial encryption technique. The AODV protocol is used to analyze the performance of proposed method to
detect wormhole attacks. It is compared with the existing technique on the basis of number of dead nodes, alive nodes and
throughput. The proposed model achieves better results as compared to the existing technique.
Page 34
Page 35
that is used to pass on information or data is usually not part of the actual network. Wormholes are dangerous because
they can do harm without even knowing the network.
Rushing attack
Two attacker nodes use the tunnel strategy to form a wormhole. If a fast transmission path lives between the two ends
of the wormhole, the tunneled packets can travel faster than those through a normal multi-hop route.
Sinkhole
In this attack, a compromised node tries to attract the data towards itself from all neighboring nodes. So, basically, the
node eavesdrops on all the data packets that are being communicated between its neighboring nodes.
Flooding
Malicious nodes can also introduce false packets into the network, or create trace packets which loop around due to
false routing information table, effectively using up the bandwidth and processing resources along the way during
transmission. This has basically major effects on ad hoc networks, since the nodes of these usually possess only less
number of resources in terms of battery and power.
In our present model, a major contribution is made to the wormhole problem in MANETs; a new model is suggest to
tackle wormhole attack based on range-free strategy and a simulation is conducted to validate the effectiveness of
proposed model.
2. RELATED WORK
Stoleru et al. [18] localization technique is used for detection of wormhole attack in MANET. A mobile secure
neighbor discovery (MSND) which permits neighbors to confirm that they are speaking directly with each other is
presented. A wormhole can be detected due to the fact that the path traveled by a ranging signal differs from expected
values when a wormhole is present.
Y. Hu et al. [19] presented that packet leaches, rely on the geographic location, distance between nodes is measured
and is used for detecting wormhole attack. Geographic and temporal leashes are presented where Global Positioning
system (GPS) and in coordinates of strict clock synchronization all nodes are required. This requirement may not be
handled by all mobile devices in the network and so it is not a practical solution.
L. Hu et al. [20] proposed for Secure Tracking of Node Encounters in Multi-Hop Wireless Networks. It uses Mutual
Authentication with Distance-bounding (MAD) protocol with directional antenna and hardware that ensures fast
sending of one-bit challenge messages without CPU involvement is used. Handling of specialized hardware like
directional antenna may be too complex structure to be executed for hand held devices in the network.
Phuong Van Tran et al. [21] said that Transmission time based mechanism (TTM) used to detect wormhole
attack.TTM detects wormhole attacks during route setup method by computing transmission time between every two
successive nodes along the established path. Wormhole is recognize base on the factor that transmission time between
two fake neighbors generated by wormhole is generally higher than that between two real neighbors which are within
radio range of each other.
H. Vu et al. [22] WORMEROS is the framework for protecting against wormhole attack which contains two phase:
one is suspicious and another one is conformation. The first phase concern inexpensive techniques and use local
information that is obtainable during the normal operation. Advance techniques in the second phase are changed only
when wormhole attack is suspected. If there is no existence of malicious node in the network after executing suspicious
phase technique then there is no necessity to waste consumption and communication resources by applying
conformation technique for detection.
Lui K.S et al. [23] proposed that The Delay per Hop Indicator (DelPHI) can detect both hidden and exposed wormhole
attacks. In DelPHI, attempts are made to find every accessible disjoint route between a sender and a receiver. Then, the
delay time and length of every route are determined and the average delay time per hop along each route is also
calculated. These values are used to identify wormhole.
Qian et al. [24] Proposed scheme (SAM) for detecting and locating wormhole attacks is that no security architecture,
systems is used. Statistical analysis is the tool to detect routing anomaly as far as sufficient detail of routes from multipath routing is available.
I. Khalil et al. [25] Liteworp also provides a protection mechanism against wormhole attack; it uses local monitoring
of traffic and secure two hop neighbor discovery by using guard node for wormhole detection.
Page 36
3. PROPOSED ALGORITHM
A general overview of the proposed model is described in Fig 2. The model consists of four main steps:
1. Localization Process.
2. Route Establishment.
3. Message authentication approach
4. Wormhole Detection.
Localization Process
Localization is the process of determining the physical coordinates of a sensor node or the spatial relationships among
objects. The Localization process
a. Generate random nodes.
b. Choose anchor nodes randomly.
c. Localize all nodes.
d. Allot a trust value for all of anchors neighbors.
Route Establishment
Route establishment consists of following steps:
1): Source nodes send RREQ to all its neighbors.
2): Intermediate nodes forward RREQ until match destination address otherwise repeat until destination not found.
3): Destination node uni-cast RREP.
4): RREP Contains: hop_count, Neighbor_list(Dest) "Destination's neighbor node list".
5): For examine wormhole detection go to STEP 4.
6): Route from source to destination established.
7): Source node stores Neighbor list(Dest) and hop_count.
Message Authentication Approach
The Message Authentication approach follows the following procedure:
a. Adopt polynomials for message authentication.
b. Messages are authenticated and verified via evaluating polynomials.
c. Independent and random factors are involved to perturb polynomial shares that are preloaded to individual nodes.
Page 37
Wormhole Detection
Wormhole Detection is performed as follows:
a. Check whether Node location within anchor communication Range.
b. If yes, wormhole may exist.
c. Check Neighbour_list(Dest), check message authentication.
d. If yes, wormhole exists.
e. Send Announce to all nodes.
f. Any node has wormhole id within Routing_Table, it removes it.
g. Re-initiate route establishment process in STEP 2, to find new route to destination node.
Value
Simulation Area
10x 15 (m)
Number of nodes
10
Communication Range
250 m
Routing Protocol
Modified
AODV
Node Speed
10 m/s
Page 38
Analysis
The analysis is done by combining and comparing the results of wormhole attack in AODV protocol with and without
using polynomial encryption technique.
Fig. 4 shows the number of dead node in AODV protocol with and without using polynomial encryption technique. The
number of dead nodes increases as rounds increases and at the end almost all the nodes become dead nodes. But using
polynomial technique fewer nodes are dead in comparison to without using polynomial technique with the respect of
round. This is because when the wormhole attack occurs, the nodes lose their energy in communication and thus they
become dead nodes.
Page 39
5. Conclusion
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack. This paper proposed a new model for wormhole
detection based on localization technique and polynomial encryption. The AODV protocol is used to analyze the
performance of proposed method to detect wormhole attacks. It is compared with the existing technique on the basis of
number of dead nodes, alive nodes and throughput. The proposed model achieves better results as compared to the
existing technique.
Future Scope
The work can be improved in future under following aspects:
The proposed method is defined specifically for polynomial technique used for authentication purpose. In future
some other authentication technique can be used.
The presented work is defined by using AODV protocol in future some other protocol can be used.
Page 40
REFERENCES
[1]. L. Zhou and Z. J. Haas, Securing ad hoc networks, IEEE Netw., vol. 13, no. 6, pp. 24 30, 1999.
[2]. E. Royer and C. Toh, A review of current routing protocols for ad hoc mobile wireless networks, Pers. Commun.
IEEE, no. April, pp. 4655, 1999.
[3]. S. Yi, P. Naldurg, and R. Kravets, Security-aware ad hoc routing for wireless networks, Symp. Mob. ad hoc
Netw. , 2001.
[4]. V. Krpijoki, Security in ad hoc networks, Semin. Netw. Secur., pp. 116, 2000.
[5]. Y. Hu, A. Perrig, and D. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks,
INFOCOM 2003. Twenty- , vol. 00, no. C, 2003.
[6]. Y. Zhang, W. Liu, W. Lou, and Y. Fang, Mask: Anonymous ondemand routing in mobile ad hoc networks,
Wirel. Commun. , vol. 5, no. 9, pp. 23762385, 2006.
[7]. Devi, Nisha, and Suman Deswal. "A REVIEW: WORMHOLE ATTACK DETECTION IN MANET."
[8]. Singh, Kamini, Gyan Singh, and Arpit Agrawal. "A Trust based Approach for Detecting and Preventing
Wormhole Attack in MANET." International Journal of Computer Applications 94.20 (2014).
[9]. K. El Defrawy and G. Tsudik, ALARM: anonymous location-aided routing in suspicious MANETs, Mob.
Comput. IEEE Trans. , pp. 1 14, 2011.
[10]. G. He, Destination-sequenced distance vector (DSDV) protocol, Netw. Lab. Helsinki Univ. , 2002.
[11]. P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, Optimized link state routing
protocol for ad hoc networks, IEEE INMIC 2001 IEEE Int. MULTI Top. Conf. 2001, Proc. Technol. 21ST
CENTURY, vol. 1, pp. 6268, 2001.
[12]. D. Johnson and D. Maltz, Dynamic source routing in ad hoc wireless networks, Mob. Comput., 1996.
[13]. C. Perkins and E. Royer, Ad-hoc on-demand distance vector routing, WMCSA99. Second IEEE Work.,
1999.
[14]. Kumar Pankaj, and Suman Deswal. "Performance Comparison of Standardized Ad-Hoc Routing Protocols
AODV, DSDV and DSR Using NCTUns Simulator." International Journal of Advanced Research in Computer
Science 2.4 (2011).
[15]. Beijar, Nicklas. "Zone routing protocol (ZRP)." Networking Laboratory, Helsinki University of Technology,
Finland (2002): 1-12.
[16]. H. Deng, W. Li, and D. Agrawal, Routing security in wireless ad hoc networks,
Commun. Mag. IEEE, no. October, pp. 7075, 2002.
[17]. R. Siwach and V. Kaul, A Study of Manet and Wormhole Attack in Mobile Adhoc
Network, J. Comput. Sci. Mob. Comput. , vol. 2, no. June, pp. 413420, 2013.
[18]. D. Johnson and D. Maltz, Dynamic source routing in ad hoc wireless networks, Mob. Comput., 1996.
[19]. R. Sivakumar, P. Sinha, and V. Bharghavan, CEDAR: A core-extraction distributed ad-hoc routing algorithm,
IEEE J. Sel. Areas Commun., vol. 17, no. 8, pp. 14541465, 1999.
[20]. N. Beijar, Zone Routing Protocol ( ZRP ), Networking Laboratory, Helsinki University of Technology, Finland,
pp. 112, 2002.
[21]. Kumar, Rakesh, et al. "Modified route-maintenance in AODV Routing protocol using static nodes in realistic
mobility model." (2011).
[22]. P. Suman and A. Suman, An Enhanced TCP Corruption Control Mechanism For
Wireless Network, HCTL Open Int. J. Technol. , vol. 1, no. January, pp. 2740, 2013.
[23]. B. Wu, J. Chen, J. Wu, and M. Cardei, A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks,
Wirel. Netw. Secur., pp. 103135, 2007.
[24]. H. Deng, W. Li, and D. Agrawal, Routing security in wireless ad hoc networks,
Commun. Mag. IEEE, no. October, pp. 7075, 2002.
[25]. Dwivedi, Shivangi, and Priyanka Tripathi. "An Efficient Approach for Detection of Wormhole Attack in Mobile
Ad-hoc Network." International Journal of Computer Applications 104.7 (2014).
Page 41