Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data

Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.

[1]  S. S. Tyagi Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .

[2]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[3]  A. Khatkar,et al.  Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[4]  M. Prasannakumar.,et al.  Classification of Ad Hoc Routing Protocols , 2018 .

[5]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[6]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[7]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Honglong Chen,et al.  Secure localization against wormhole attacks using conflicting sets , 2010, International Performance Computing and Communications Conference.

[9]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[10]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[11]  Jong-Wook Jang,et al.  Result Based on NS2, Simulation and Emulation Verification , 2009, 2009 International Conference on New Trends in Information and Service Science.

[12]  Siddlingappagouda Biradar,et al.  Performance Analysis of AODV Routing Protocol Under Flooding Attack in Manet’s Using NS2 , 2015 .

[13]  Mohamed Hashem,et al.  Securing DSR with mobile agents in wireless ad hoc networks , 2011 .

[14]  S. J. Soni,et al.  Enhancing security features & performance of AODV protocol under attack for MANET , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).

[15]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[16]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[17]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[18]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[19]  Yunhao Liu,et al.  WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.

[20]  Daniel Mahrenholz,et al.  Adjusting the ns-2 Emulation Mode to a Live Network , 2005, KiVS.

[21]  Durgesh Kumar Mishra,et al.  Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).

[22]  Saurabh Bagchi,et al.  MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.

[23]  Yi Mu,et al.  Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..