A novel approach for avoiding wormhole attacks in VANET

Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network topology. This attack severely disrupts the network operation, especially in networks that use on demand routing protocols such as AODV or DSR. In this paper we try to introduce an efficient method to prevent wormhole attack in vehicular ad hoc networks and detect malicious nodes as far as possible. Occurrence of this type of attack in vehicular networks may cause irreparable lost and therefore the presented method in this paper concentrates on AODV. Routing protocols for unicast application can be extended to other sending protocols regardless of being unicast, broadcast or multicast. In this paper, we use packet leashes and new method of authentication called HEAP. Also, some correction has been done on packet leashes method. We will prove this scheme can avoid wormhole attack in these types of networks for all applications easily. We want to show that our suggested scheme has low overhead, increases security and performance in an acceptable level in the network.

[1]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[3]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[5]  Hugo Krawczyk,et al.  Keying Hash Functions for Message Authentication , 1996, CRYPTO.

[6]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[7]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[8]  Nima Haghpanah,et al.  Trusted secure routing for ad hoc networks , 2007, MobiWac '07.

[9]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[11]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[12]  Turgay Korkmaz,et al.  HEAP: A packet authentication scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[13]  Shouhuai Xu,et al.  LHAP: A lightweight network access control protocol for ad hoc networks , 2006, Ad Hoc Networks.

[14]  Udo W. Pooch,et al.  A lightweight authentication protocol for mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[15]  Stephen T. Kent,et al.  Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[16]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.