Projection Pursuit Based Wormhole Detection in Ad Hoc Network

Ad hoc networks have found increasingly wide applications in many fields nowadays. At the meantime, various attacks against Ad hoc have emerged, such as wormhole attack, denial of service (DoS), black holes attack and gray holes attack, among which wormhole attack is most difficult to detect and is most destructive to the network. At present, there are limitations in various worm hole detection mechanisms, some require that the data collected should conform to specific probability distribution, and some even require the introduction of encryption and authentication mechanism or additional equipment and are poor in flexibility. Projection pursuit (PP) based wormhole detection mechanism does not depend on specific data distribution and can directly mine data dependency for wormhole evaluation on network nodes. PP adopts genetic algorithm to optimize projection direction and the projection results obtained can directly be used in wormhole evaluation. In this paper, we first simulate AODV routing protocol based Ad hoc network by using NS2.After data collection and through comparing a one dimensional projection and two dimensional projections, we find that one-dimensional project has little data loss and high accuracy in wormhole detection. Projection pursuit based wormhole detection gives us new insights into wormhole detection and is a wormhole detection completely based on statistics.

[1]  J. Scott Tyo,et al.  Spatial and Spatiotemporal Projection Pursuit Techniques to Predict the Extratropical Transition of Tropical Cyclones , 2007, IEEE Transactions on Geoscience and Remote Sensing.

[2]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[3]  Ma Hongwei The study on ad hoc networks security strategy based on Routing Protocols , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[4]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[5]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[6]  Wlodzislaw Duch,et al.  Projection Pursuit Constructive Neural Networks Based on Quality of Projected Clusters , 2008, ICANN.

[7]  Sanjay Keer,et al.  To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[8]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[9]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[10]  Marianne Azer Wormhole Attacks Mitigation in Ad Hoc Networks , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.