Wormhole attack prevention using clustering and digital signatures in reactive routing

Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperative algorithms, lack of centralized monitoring and resource constraints, ad hoc networks are vulnerable to many kinds of attacks, among which wormhole attack is chosen as the topic of discussion. This attack, when launched during route discovery phase can percolate wrong route/topology information into the network thereby, defeating the purpose of routing algorithms. In this paper we propose a novel technique based on clustering and digital signatures for prevention against wormhole attacks without use of special hardware, time synchronisation or dependency on time or hop difference between colluding nodes to identify attacked routes. We employ independent algorithms to form clusters and to implement intra-cluster and inter-cluster routing of data packets. Simulation Results show that the method achieved high level of efficiency in isolating wormhole nodes in the network.

[1]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[2]  Gunhee Lee,et al.  An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[3]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Chris McDonald,et al.  Detecting and Evading Wormholes in Mobile Ad-hoc Wireless Networks , 2006, Int. J. Netw. Secur..

[5]  Sanjay Keer,et al.  To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[6]  D. Jhonson The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .

[7]  Majid Naderi,et al.  New approach for detection and defending the wormhole attacks in Wireless ad hoc networks , 2010, 2010 18th Iranian Conference on Electrical Engineering.

[8]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[9]  Jie Gao,et al.  Detecting wormhole attacks in wireless networks , 2006, 2006 2nd IEEE Workshop on Wireless Mesh Networks.