A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology

Mobile ad hoc networks are vulnerable to a large group of attacks, e.g., wormhole attacks. In this paper, we propose a countermeasure to prevent wormhole attacks. We utilize analytical hierarchy process to elect some special nodes, named the local most trustable nodes, for the source and the destination node, respectively. The elected nodes are then required to implement our proposed scheme to prevent wormhole attacks. The proposed scheme cannot only detect wormhole attacks, but also locate wormhole nodes, i.e., identify the malicious nodes that behave wormhole attacks. To solve the colluding wormhole attack, we present a countermeasure named bi-directional wormhole location mechanism.

[1]  Thomas L. Saaty,et al.  DECISION MAKING WITH THE ANALYTIC HIERARCHY PROCESS , 2008 .

[2]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[3]  Katina Michael,et al.  Toward the regulation of ubiquitous mobile government: a case study on location-based emergency services in Australia , 2011, Electron. Commer. Res..

[4]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[5]  Sherali Zeadally,et al.  A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) , 2012, Electron. Commer. Res..

[6]  Preeti Nagrath,et al.  Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[7]  Sherali Zeadally,et al.  Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks , 2010, Electron. Commer. Res..

[8]  Bin Wang,et al.  Location-based services deployment and demand: a roadmap model , 2011, Electron. Commer. Res..

[9]  Tomoya Enokido,et al.  Trustworthy Group Making Algorithm in Distributed Systems , 2011, Human-centric Computing and Information Sciences.

[10]  Zuowen Tan An efficient identity-based tripartite authenticated key agreement protocol , 2012, Electron. Commer. Res..

[11]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[12]  Michael P. Howarth,et al.  Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..

[13]  Weijie Liu,et al.  Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[15]  Nilmini Wickramasinghe,et al.  Security of a Mobile Transaction: A Trust Model , 2004, Electron. Commer. Res..

[16]  Tao Zhou An empirical examination of user adoption of location-based services , 2013, Electron. Commer. Res..

[17]  Jorma Skyttä,et al.  Enhanced Augmented IP Routing Protocol (EAIRP) in IPv6 Environment , 2001, Electron. Commer. Res..

[18]  Weijie Liu,et al.  A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks , 2013, Telecommun. Syst..

[19]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[20]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Weiwei Sun,et al.  A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETs , 2011, 2011 IEEE Asia-Pacific Services Computing Conference.