Skip to main content
Erschienen in: Wireless Personal Communications 2/2017

06.07.2017

Wormhole Attack Detection Technique in Mobile Ad Hoc Networks

verfasst von: Parvinder Kaur, Dalveer Kaur, Rajiv Mahajan

Erschienen in: Wireless Personal Communications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A wormhole attack is harmful attack against routing protocols in ad hoc network where node attracts packets from one location and retransmits them to other location using long range link within the network. A wormhole attack can be easily launched between two attacker nodes without compromising the mobile nodes. Most of routing protocols don’t have any defending technique against wormhole activities; so in the presence of attacker nodes malicious activities may occur and disrupt network communication by tamper the data or forward the message to unknown location of the network to disrupt it functionality. Several routing protocols have been proposed to defend against wormhole attack in mobile ad hoc networks by adapting synchronization clocks, GPS or any special hardware. In this research article, we proposed a novel wormhole detection technique which identifies the wormhole link by calculating the maximum end to end delay between two nodes within the communication range. Mobile nodes do not need to be equipped with GPS, clock synchronized or any other type of special hardware. The simulation results prove that proposed scheme detects wormhole attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22.CrossRef
2.
Zurück zum Zitat Corson, S., & Macker, J. (1998). Mobile ad hoc networking (MANETSS): Routing protocol performance issues and evaluation considerations (No. RFC 2501). Corson, S., & Macker, J. (1998). Mobile ad hoc networking (MANETSS): Routing protocol performance issues and evaluation considerations (No. RFC 2501).
3.
Zurück zum Zitat Naït-Abdesselam, F., Bensaou, B., & Taleb, T. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46(4), 127–133.CrossRef Naït-Abdesselam, F., Bensaou, B., & Taleb, T. (2008). Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Communications Magazine, 46(4), 127–133.CrossRef
4.
Zurück zum Zitat Khabbazian, M., Mercier, H., & Bhargava, V. K. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736–745.CrossRef Khabbazian, M., Mercier, H., & Bhargava, V. K. (2009). Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Transactions on Wireless Communications, 8(2), 736–745.CrossRef
5.
Zurück zum Zitat Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6(4), 483–503.CrossRef Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6(4), 483–503.CrossRef
6.
Zurück zum Zitat Chiu, H. S., & Lui, K. S. (2006) DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 1st international symposium on wireless pervasive computing. IEEE. Chiu, H. S., & Lui, K. S. (2006) DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In 1st international symposium on wireless pervasive computing. IEEE.
7.
Zurück zum Zitat Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986). IEEE. Hu, Y. C., Perrig, A., & Johnson, D. B. (2003, April). Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986). IEEE.
8.
Zurück zum Zitat Čapkun, S., Levente B., & Hubaux, J.-P.(2003) SECTOR: Secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks. ACM. Čapkun, S., Levente B., & Hubaux, J.-P.(2003) SECTOR: Secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks. ACM.
9.
Zurück zum Zitat Song, N., Qian, L., & Li, X. (2005, April). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In 19th IEEE international parallel and distributed processing symposium (p. 8). IEEE. Song, N., Qian, L., & Li, X. (2005, April). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In 19th IEEE international parallel and distributed processing symposium (p. 8). IEEE.
10.
Zurück zum Zitat Wang, W., & Bhargava, B. (2004, October). Visualization of wormholes in sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 51–60). ACM. Wang, W., & Bhargava, B. (2004, October). Visualization of wormholes in sensor networks. In Proceedings of the 3rd ACM workshop on wireless security (pp. 51–60). ACM.
11.
Zurück zum Zitat Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22–35.CrossRef Chen, H., Lou, W., Wang, Z., Wu, J., Wang, Z., & Xia, A. (2015). Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive and Mobile Computing, 16, 22–35.CrossRef
12.
Zurück zum Zitat Lazos, L., & Poovendran, R. (2005). SeRLoc: Robust localization for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(1), 73–100.CrossRef Lazos, L., & Poovendran, R. (2005). SeRLoc: Robust localization for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 1(1), 73–100.CrossRef
13.
Zurück zum Zitat Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.CrossRef Madria, S., & Yin, J. (2009). SeRWA: A secure routing protocol against wormhole attacks in sensor networks. Ad Hoc Networks, 7(6), 1051–1063.CrossRef
16.
Zurück zum Zitat Pirzada, A. A., & McDonald, C. (2006). Detecting and evading wormholes in mobile ad hoc wireless networks. IJ Network Security, 3(2), 191–202. Pirzada, A. A., & McDonald, C. (2006). Detecting and evading wormholes in mobile ad hoc wireless networks. IJ Network Security, 3(2), 191–202.
Metadaten
Titel
Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
verfasst von
Parvinder Kaur
Dalveer Kaur
Rajiv Mahajan
Publikationsdatum
06.07.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 2/2017
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-4643-z

Weitere Artikel der Ausgabe 2/2017

Wireless Personal Communications 2/2017 Zur Ausgabe

Neuer Inhalt