Performance Evaluation of Routing Protocols Based on Wormhole Attack in Wireless Mesh Networks

Wireless Mesh Network is a new networking paradigm. In the development of wireless mesh networks routing is the main issue. There are different security flaws and attacks on routing protocols in wireless mesh networks. These attacks can affect the performance of different routing protocols. Wormhole is one of these attacks. The wormhole attack can affect the performance of different routing protocols. During this attack, a malicious node captures packets from one location in the network, and “tunnels” them to another malicious node at a distant point, which replays them locally. This paper illustrates how wormhole attack can affect the performance of routing protocols in wireless mesh networks by using QualNet simulator.

[1]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[2]  Christopher Ré,et al.  Challenges for Event Queries over Markovian Streams , 2008, IEEE Internet Computing.

[3]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[6]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[8]  Sajal K. Das,et al.  Security Issues in Wireless Mesh Networks , 2008 .

[9]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[10]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[11]  V. Sankaranarayanan,et al.  Prevention of Impersonation Attack in Wireless Mobile Ad hoc Networks , 2007 .

[12]  Vallipuram Muthukkumarasamy,et al.  Securing Wireless Mesh Networks , 2008, IEEE Internet Computing.

[13]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[14]  Ian F. Akyildiz,et al.  Wireless mesh networks: a survey , 2005, Comput. Networks.