Skip to main content

2016 | OriginalPaper | Buchkapitel

Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET

verfasst von : Dhruvi Sharma, Vimal Kumar, Rakesh Kumar

Erschienen in: Computational Intelligence in Data Mining—Volume 2

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad hoc network (MANET) has attracted many security attacks due to its characteristics of dynamic topology, limited resources and decentralize monitoring. One of these vulnerable attack is wormhole in which two or more malicious nodes form a tunnel like structure to relay packets among themselves. This type of attack may cause selective forwarding, fabrication and alteration of packets being sent. In this paper, we have proposed a way to protect network from wormhole attack by using identity based signature scheme on cluster based ad hoc network. Proposed scheme does not require distribution of any certificate among the nodes so it decreases computation overhead. We have also discussed existing work that either require certifcates or does not accomplish all the security requirements of network. Our simulation results show that attack is prevented successfully and it outperforms other schemes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Burmeste, M., Medeiros, B.D.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 8, pp. 1180–1188. IEEE Press (2009) Burmeste, M., Medeiros, B.D.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 8, pp. 1180–1188. IEEE Press (2009)
2.
Zurück zum Zitat Howarthy, N.M.P.: A survey of MANET intrusion detection prevention approaches for network layer attacks. In: Proceedings of IEEE Communications Surveys Tutorials, pp. 1–19 (2013) Howarthy, N.M.P.: A survey of MANET intrusion detection prevention approaches for network layer attacks. In: Proceedings of IEEE Communications Surveys Tutorials, pp. 1–19 (2013)
3.
Zurück zum Zitat Bar, R.K., Mandal, J.K., Singh, M.M.: QoS of MANET through trust based AODV routing protocol by exclusion of blak hole attack. In: Proceedings of Elsevier Technology Elsevier, pp. 530–537 (2013) Bar, R.K., Mandal, J.K., Singh, M.M.: QoS of MANET through trust based AODV routing protocol by exclusion of blak hole attack. In: Proceedings of Elsevier Technology Elsevier, pp. 530–537 (2013)
4.
Zurück zum Zitat Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials. Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005) Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials. Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005)
5.
Zurück zum Zitat Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, p. 2839. IEEE Press (2004) Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, p. 2839. IEEE Press (2004)
6.
Zurück zum Zitat Phuong, T.V., Trong Canh, N., Lee, Y.-K., Lee, S., Lee, H.: Transmission time-based mechanism to detect wormhole attack. In: Proceedings of IEEE Asia-Paci_c Service Computing Conference (2007) Phuong, T.V., Trong Canh, N., Lee, Y.-K., Lee, S., Lee, H.: Transmission time-based mechanism to detect wormhole attack. In: Proceedings of IEEE Asia-Paci_c Service Computing Conference (2007)
7.
Zurück zum Zitat Sharma, P., Trivedi, A.: An approach to defend against wormhole attacks in ad hoc network using digital signature. In: Proceeding of IEEE (2011) Sharma, P., Trivedi, A.: An approach to defend against wormhole attacks in ad hoc network using digital signature. In: Proceeding of IEEE (2011)
8.
Zurück zum Zitat Maulik, R., Chaki, N.: A study on wormhole attacks in MANET. In: Proceeding of International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988, vol. 3, pp. 271–279 (2011) Maulik, R., Chaki, N.: A study on wormhole attacks in MANET. In: Proceeding of International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988, vol. 3, pp. 271–279 (2011)
9.
Zurück zum Zitat Shamir, A.: Identity-base cryptosystems and signature schemes. Proc. LNCS 196, 47–53 (1985)MATH Shamir, A.: Identity-base cryptosystems and signature schemes. Proc. LNCS 196, 47–53 (1985)MATH
10.
Zurück zum Zitat Guerrero Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002) Guerrero Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002)
11.
Zurück zum Zitat Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad-hoc networks. In: Department of Computer Science, Rice University, Technical Report TR01-384, June (2002) Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad-hoc networks. In: Department of Computer Science, Rice University, Technical Report TR01-384, June (2002)
12.
Zurück zum Zitat Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Proceeding of Ad Hoc Networks Wireless (ADHOCNOW’ 03), pp. 140–150 (2003) Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Proceeding of Ad Hoc Networks Wireless (ADHOCNOW’ 03), pp. 140–150 (2003)
13.
Zurück zum Zitat Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of Network and Distributed System Security Symposium, p. 13141 (2004) Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of Network and Distributed System Security Symposium, p. 13141 (2004)
14.
Zurück zum Zitat Khalil, I., Bagchi, S., Shro, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multi-hop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 612–621 (2005) Khalil, I., Bagchi, S., Shro, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multi-hop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 612–621 (2005)
15.
Zurück zum Zitat Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In: Proceedings of 4th IEEE Consumer Communication and Networking Conference (CCNC07), pp. 593–598 (2007) Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In: Proceedings of 4th IEEE Consumer Communication and Networking Conference (CCNC07), pp. 593–598 (2007)
16.
Zurück zum Zitat Sharma, P., Trivedi, A.: An approach to defend against wormhole attack in ad hoc network using digital signature. In: Proceedings of 3rd IEEE International Conference on Communication Soft-ware and Networks (ICCSN) Sharma, P., Trivedi, A.: An approach to defend against wormhole attack in ad hoc network using digital signature. In: Proceedings of 3rd IEEE International Conference on Communication Soft-ware and Networks (ICCSN)
Metadaten
Titel
Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET
verfasst von
Dhruvi Sharma
Vimal Kumar
Rakesh Kumar
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2731-1_45