Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation

This paper proposes a method to detect and isolate wormhole attacks in mobile ad hoc networks (MANETs). The main idea of this paper is to create many possible routes when sending Route Request (RREQ) from source to destination and to use those routes as reference of each other, in order to find malicious nodes with suspicious behavior within the network. The proposed method works in three steps, which are using routes redundancy, routes aggregation and calculating round-trip time (RTT) of all listed routes. Routes redundancy is started where source sends RREQ using every possible way to destination. All routes that connect source and destination are listed together with the number of hops from every route. Some routes gathered in the same relay point before destination is aggregated, so all nodes that join the network can be listed and the behavior of malicious nodes in can be detected. The RTT and number of hops of all listed routes are compared in order to detect suspicious route. Nodes with suspicious behavior within network are isolated and will not be considered for transmission. Simulation results shows the ability to prevent the increasing of packets dropped, based on wormhole isolation in our proposed scheme compare to normal AODV protocol and approach of previous time-based calculation.

[1]  King Sun Chan,et al.  TCBWD: Topological comparison-based Byzantine wormhole detection for MANET , 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[2]  Liang Qin,et al.  Survey on Mobile Ad Hoc Network Routing Protocols and Cross-Layer Design , 2004 .

[3]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[4]  S. C. Sharma,et al.  A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS , 2010 .

[5]  Mahesh K. Marina,et al.  On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[6]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[7]  Liu Fagui,et al.  Research & implementation of uCLinux-based embedded browser , 2007 .

[8]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[9]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[10]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[11]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[12]  Jie Wu,et al.  A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.

[13]  Li Li,et al.  Wormhole attack detection based on distance verification and the Use of hypothesis testing for wireless ad hoc networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[14]  J. Kaiser,et al.  Survey of mobile ad hoc network routing protocols , 2005 .