Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET

Mobile ad hoc network (MANET) has attracted many security attacks due to its characteristics of dynamic topology, limited resources and decentralize monitoring. One of these vulnerable attack is wormhole in which two or more malicious nodes form a tunnel like structure to relay packets among themselves. This type of attack may cause selective forwarding, fabrication and alteration of packets being sent. In this paper, we have proposed a way to protect network from wormhole attack by using identity based signature scheme on cluster based ad hoc network. Proposed scheme does not require distribution of any certificate among the nodes so it decreases computation overhead. We have also discussed existing work that either require certifcates or does not accomplish all the security requirements of network. Our simulation results show that attack is prevented successfully and it outperforms other schemes.

[1]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[2]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[3]  Mike Burmester,et al.  On the Security of Route Discovery in MANETs , 2009, IEEE Transactions on Mobile Computing.

[4]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[5]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[6]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[7]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[8]  J. K. Mandal,et al.  QoS of MANet Through Trust based AODV Routing Protocol by Exclusion of Black Hole Attack , 2013 .

[9]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[10]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[11]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[12]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[13]  Donal O'Mahony,et al.  Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.