Detection and Prevention of Wormhole Attacks in MANETs using Detection Packet

In MANET, data transmission is performed within an un-trusted wireless environment. Various kinds of attack have been identified and corresponding solutions have been proposed. In wormhole attack, an attacker record packets at one location into the network, tunnel them to another location and retransmits them there into the network. Previous works on wormhole attacks have focused only on detection and used specialized hardware such as directional antennas or extremely accurate clocks. More recent work has difference of hop distance at node, create packet with two fields processing bit, count to reach next hop and AODV for route establishment, public key encryption method are also used. In this paper, we present a general mechanism, without use of hardware, location information and clock synchronization called detection packet for detecting malicious node in network. Detection Packet has three fields: processing bit, count to reach next hop and time stamp. Timestamp is used for strongly detection with conformance at wormhole attack. Here detection packet can easily be included in the wide range of ad hoc routing protocol with only significant change in the existing protocol to defend against wormhole attack. Here DSR protocol is use for route establishment and NS-2 for simulations.

[1]  Jean-Philippe Babau,et al.  Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[2]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[3]  Chi-Sung Laih,et al.  A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.

[4]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[5]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[6]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[7]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[8]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[9]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).