Skip to main content
Erschienen in: Wireless Networks 7/2019

02.05.2018

MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network

verfasst von: Tu T. Vo, Ngoc T. Luong, Doan Hoang

Erschienen in: Wireless Networks | Ausgabe 7/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wormhole attack is a serious security issue in Mobile Ad hoc Network where malicious nodes may distort the network topology and obtain valuable information. Many solutions, based on round trip time, packet traversal time, or hop-count, have been proposed to detect wormholes. However, these solutions were only partially successful in dealing with node high-speed mobility, variable tunnel lengths, and fake information by malicious nodes. To address those issues, this paper proposes a novel multi-level authentication model and protocol (MLAMAN) for detecting and preventing wormhole attacks reliably. MLAMAN allows all intermediate nodes to authenticate control packets on a hop-by-hop basis and at three levels: (1) the packet level where the integrity of the packets can be verified, (2) the node membership level where a public key holder-member can be certified, and (3) the neighborhood level where the neighborhood relationship between nodes can be determined. The novelty of the model is that it prevents malicious nodes from joining the network under false information and pretense. It detects wormhole nodes effectively under various scenarios including variable tunnel lengths and speeds of moving nodes. The effectiveness of our approach is confirmed by simulation results through various scenarios.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akilarasu, G., & Shalinie, S. M. (2017). Wormhole-free routing and DoS attack defense in wireless mesh networks. Wireless Networks, 23(6), 1709–1718.CrossRef Akilarasu, G., & Shalinie, S. M. (2017). Wormhole-free routing and DoS attack defense in wireless mesh networks. Wireless Networks, 23(6), 1709–1718.CrossRef
2.
Zurück zum Zitat Chiu, H., & Wong Lui, K. (2006). DelPHI: Wormhole detection mechanism for Ad hoc Wireless Networks. In International symposium on wireless pervasive computing proceedings (pp. 6–11). Chiu, H., & Wong Lui, K. (2006). DelPHI: Wormhole detection mechanism for Ad hoc Wireless Networks. In International symposium on wireless pervasive computing proceedings (pp. 6–11).
4.
5.
Zurück zum Zitat Eiman, A., & Biswanath, M. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940–965.CrossRef Eiman, A., & Biswanath, M. (2012). A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks, 56(2), 940–965.CrossRef
7.
Zurück zum Zitat Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks, 24(2), 565–579.CrossRef Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating gray hole attack in MANET. Wireless Networks, 24(2), 565–579.CrossRef
8.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Twenty-second Annual Joint Conference of the IEEE computer and communications societies, 3, 1976–1986. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Twenty-second Annual Joint Conference of the IEEE computer and communications societies, 3, 1976–1986.
9.
Zurück zum Zitat Imrich, C., Marco, C., & Jennifer, J. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef Imrich, C., Marco, C., & Jennifer, J. (2003). Mobile ad hoc networking: Imperatives and challenges. Ad Hoc Networks, 1(1), 13–64.CrossRef
10.
Zurück zum Zitat Jan, V. M., Ian, W., & Winston, K. S. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of Network and Computer Applications, 35(4), 1249–1259.CrossRef Jan, V. M., Ian, W., & Winston, K. S. (2012). Security threats and solutions in MANETs: A case study using AODV and SAODV. Journal of Network and Computer Applications, 35(4), 1249–1259.CrossRef
11.
Zurück zum Zitat Jen, S. M., Laih, C. S., & Kuo, W. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022–5039.CrossRef Jen, S. M., Laih, C. S., & Kuo, W. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022–5039.CrossRef
12.
Zurück zum Zitat Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks (pp. 153–181). Boston: Springer. Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks (pp. 153–181). Boston: Springer.
14.
Zurück zum Zitat Karlsson, J., Dooley, L. S., & Pulkkis, G. (2011). A New MANET wormhole detection algorithm based on traversal time and hop count analysis. Sensors, 11(12), 11,122–11,140.CrossRef Karlsson, J., Dooley, L. S., & Pulkkis, G. (2011). A New MANET wormhole detection algorithm based on traversal time and hop count analysis. Sensors, 11(12), 11,122–11,140.CrossRef
15.
Zurück zum Zitat Karlsson, J., Dooley, L. S., & Pulkkis, G. (2013). Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm. Sensors, 13(5), 6651–6668.CrossRef Karlsson, J., Dooley, L. S., & Pulkkis, G. (2013). Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm. Sensors, 13(5), 6651–6668.CrossRef
16.
Zurück zum Zitat Khurana, S., & Gupta, N. (2011). End-to-end protocol to secure ad hoc networks against wormhole attacks. Security and Communication Networks, 4(9), 994–1002.CrossRef Khurana, S., & Gupta, N. (2011). End-to-end protocol to secure ad hoc networks against wormhole attacks. Security and Communication Networks, 4(9), 994–1002.CrossRef
17.
Zurück zum Zitat Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM Workshop on Wireless Security (pp. 21–30). Lazos, L., & Poovendran, R. (2004). SeRLoc: Secure range-independent localization for wireless sensor networks. In Proceedings of the 3rd ACM Workshop on Wireless Security (pp. 21–30).
18.
Zurück zum Zitat Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L.W. (2005). Preventing wormhole attacks on Wireless Ad hoc Networks: A graph theoretic approach. In IEEE Wireless Communications and Networking Conference (Vol. 2, pp. 1193–1199) Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L.W. (2005). Preventing wormhole attacks on Wireless Ad hoc Networks: A graph theoretic approach. In IEEE Wireless Communications and Networking Conference (Vol. 2, pp. 1193–1199)
19.
Zurück zum Zitat Manel, G. Z. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef Manel, G. Z. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6(3), 106–107.CrossRef
20.
Zurück zum Zitat Nagrath, P., Aneja, S., Gupta, N., & Madria, S. (2016). Protocols for mitigating blackhole attacks in delay tolerant networks. Wireless Networks, 22(1), 235–246.CrossRef Nagrath, P., Aneja, S., Gupta, N., & Madria, S. (2016). Protocols for mitigating blackhole attacks in delay tolerant networks. Wireless Networks, 22(1), 235–246.CrossRef
21.
Zurück zum Zitat Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353–2364.CrossRef Ngai, E. C., Liu, J., & Lyu, M. R. (2007). An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks. Computer Communications, 30(11), 2353–2364.CrossRef
22.
Zurück zum Zitat Ngoc, L. T., & Tu, V. T. (2017). Whirlwind: A new method to attack routing protocol in mobile ad hoc network. International Journal of Network Security, 19(5), 832–838. Ngoc, L. T., & Tu, V. T. (2017). Whirlwind: A new method to attack routing protocol in mobile ad hoc network. International Journal of Network Security, 19(5), 832–838.
23.
Zurück zum Zitat Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications (pp. 90–100). Perkins, C. E., & Royer, E. M. (1999). Ad-hoc on-demand distance vector routing. In Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications (pp. 90–100).
24.
Zurück zum Zitat Pietro, R. D., Guarino, S., Verde, N., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.CrossRef Pietro, R. D., Guarino, S., Verde, N., & Domingo-Ferrer, J. (2014). Security in wireless ad-hoc networks—A survey. Computer Communications, 51, 1–20.CrossRef
25.
Zurück zum Zitat Poovendran, R., & Lazos, L. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef Poovendran, R., & Lazos, L. (2007). A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks, 13(1), 27–59.CrossRef
26.
Zurück zum Zitat Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., & Belding-Royer, E.M. (2002). A secure routing protocol for Ad hoc Networks. In Proceedings on 10th IEEE International Conference on Network Protocols, 2002 (pp. 78 – 87). Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., & Belding-Royer, E.M. (2002). A secure routing protocol for Ad hoc Networks. In Proceedings on 10th IEEE International Conference on Network Protocols, 2002 (pp. 78 – 87).
27.
Zurück zum Zitat Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505–1511.CrossRef Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505–1511.CrossRef
29.
Zurück zum Zitat Yoon, J., Liu, M., & Noble, B. (2003). Random waypoint considered harmful. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428) (Vol. 2, pp. 1312–1321). Yoon, J., Liu, M., & Noble, B. (2003). Random waypoint considered harmful. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428) (Vol. 2, pp. 1312–1321).
Metadaten
Titel
MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network
verfasst von
Tu T. Vo
Ngoc T. Luong
Doan Hoang
Publikationsdatum
02.05.2018
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2019
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-018-1734-z

Weitere Artikel der Ausgabe 7/2019

Wireless Networks 7/2019 Zur Ausgabe

Neuer Inhalt