Wormhole attack in mobile ad-hoc networks

Wireless networks are playing important role for development and ease of use of human society. It also gets a lot of attention from research community towards the betterment of applications. A wide range of applications make it very popular and backbone of technology system i.e. GSM, Bluetooth, Wi-Fi etc. In order to categorization of applications, this network gives a unique range for monitoring and surveillance. MANETs may be ad-hoc is fixed natured use to deploy into remote areas for sensing and processing desire information. Due to distributed and open natured of wireless networks, it is vulnerable and prone for attacked to intercept and hijack network communication. Its deployment in remote areas requires more concern of security issues. Open natured communication be a magnet for attacker to intercept and catch the sensed information. Numerous security threats can adversely affect its functioning & degrade network performance. The problem becomes more critical when it deploy for defense mission. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to leak the information. A various security threats like Worm-hole attack, Black-hole Attack, Gray-hole attack, Sybil Attack etc. are used for packet dropping, capturing and degrading network performance. Security in mobile networks is a challenging task. Furthermore, low profile resources and security overhead create cumbersome situation for detection and prevention mechanism. The complete study observes that, security threats not only capture the packets but also degrade network performance. To overcome vulnerability problems, work considers wormhole attack as study target and will derive mechanism to identify and prevent mobile networks from security threat. A wormhole attack is very popular and applies on network layer by targeting vulnerabilities of routing protocols. The complete works consider Ad-hoc On Demand Routing protocol and identify several vulnerabilities.

[1]  N. Geethanjali,et al.  Performance issues on AODV and AOMDV for MANETS , 2010 .

[2]  Nisha S. Raote Defending Wormhole Attack in Wireless Ad-hoc Network , 2011 .

[3]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[4]  Yi Qian,et al.  Performance Study of a Secure Routing Protocol in Wireless Mobile Ad Hoc Networks , 2007, 2007 2nd International Symposium on Wireless Pervasive Computing.

[5]  Ashish Kr,et al.  Review on security issues of AODV routing protocol for MANETs , 2013 .

[6]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[7]  Yunhao Liu,et al.  Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks , 2011, IEEE/ACM Trans. Netw..

[8]  Khin Sandar Win,et al.  Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .

[9]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[10]  Abhishek Pandey,et al.  A Survey on Wireless Sensor Networks Security , 2010 .

[11]  Magdy S. El-Soudani,et al.  A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.

[12]  Kulbir Singh,et al.  A Review of various security protocols in Wireless Sensor Network , 2011 .

[13]  Marjan Kuchaki Rafsanjani,et al.  A new method for improving security in MANETs AODV Protocol , 2012 .

[14]  Subir Kumar Sarkar,et al.  Issues in Wireless Sensor Networks , 2008 .