A Comprehensive Study on Defence Against Wormhole Attack Methods in Mobile Ad hoc Networks

A mobile ad hoc network (MANET) contains a collection of wireless mobile nodes that forms a temporary network without having any fixed infrastructure or centralized administration. MANET is assailable to routing misbehaviour. We are worried of an especially severe security attack that affects the MANET routing protocols, it is called the wormhole attack. During the attack an attacker captures packets from one location in the network, and tunnels them to other attacker at a distant point, which replays them locally. In this paper, we examine briefly the behavior of various Denial-of-Service attacks at the network layer of MANET and provide comprehensive survey of on wormhole attack and introduce the existing defense approaches to these attacks.

[1]  Jagpreet Singh,et al.  Performance Analysis of MANET under Blackhole Attack , 2009, 2009 First International Conference on Networks & Communications.

[2]  J. Scolforo,et al.  Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs , 2022 .

[3]  Bin Wang,et al.  Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..

[4]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[5]  Shahram Jamali,et al.  Performance Evaluation of AODV, LHC-AODV, OLSR, UL-OLSR, DSDV Routing Protocols , 2013 .

[6]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[7]  Pramod Kumar Soni,et al.  A Survey of Mobile Ad Hoc Network Attacks , 2013 .

[8]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[9]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[10]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[11]  Gunhee Lee,et al.  An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[12]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[14]  Rutvij H. Jhaveri,et al.  Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs - ERRATA , 2012 .

[15]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[17]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[18]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[19]  A. Amara Korba,et al.  Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.

[20]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[21]  S. M. Ramesh,et al.  Biologically inspired artificial intrusion detection system for detecting wormhole attack in MANET , 2014, Wirel. Networks.

[22]  Shahram Jamali,et al.  An Improvement over AODV Routing Protocol by Limiting Visited Hop Count , 2013 .

[23]  Yi Mu,et al.  Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..

[24]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[25]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[26]  Xice Sun,et al.  A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..

[27]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[28]  MengChu Zhou,et al.  A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.

[29]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[30]  H. Chris Tseng,et al.  Sinkhole intrusion indicators in DSR MANETs , 2004, First International Conference on Broadband Networks.

[31]  Magdy S. El-Soudani,et al.  Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[32]  Xia Wang Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[33]  Nabendu Chaki,et al.  A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[34]  Uyen Trang Nguyen,et al.  Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).

[35]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[36]  Seong-Moo Yoo,et al.  Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.

[37]  Tao Zhou An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..

[38]  Narayan C. Debnath,et al.  Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management , 2008, 2008 IEEE Symposium on Computers and Communications.

[39]  A. Khatkar,et al.  Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).

[40]  Soo Young Shin,et al.  Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).

[41]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[42]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[43]  Katina Michael,et al.  Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..

[44]  Hong Liang,et al.  Defending against wormhole attack in OLSR , 2006 .

[45]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[46]  JooSeok Song,et al.  Novel defense mechanism against data flooding attacks in wireless ad hoc networks , 2010, IEEE Transactions on Consumer Electronics.

[47]  Rutvij H. Jhaveri,et al.  MANET Routing Protocols and Wormhole Attack against AODV , 2010 .

[48]  Ali Modirkhazeni,et al.  Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.

[49]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[50]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[51]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[52]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[53]  Hyun Jin Kim,et al.  Detecting Selfish Behavior in a Cooperative Commons , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[54]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[55]  Dr Pradip M. Jawandhiya A Survey of Mobile Ad Hoc Network Attacks , 2019 .