A New Statistical Method for Wormhole Attack Detection in MANETs

Mobile ad hoc networks (MANETs) are a set of mobile wireless nodes that can communicate without the need for an infrastructure. Features of MANETs have made them vulnerable to many security attacks including wormhole attack. In the past few years, different methods have been introduced for detecting, mitigating, and preventing wormhole attacks in MANETs. In this paper, we introduce a new decentralized scheme based on statistical metrics for detecting wormholes that employs “number of new neighbors” along with “number of neighbors” for each node as its parameters. The proposed scheme has considerably low detection delay and does not create any traffic overhead for routing protocols which include neighbor discovery mechanism. Also, it possesses reasonable processing power and memory usage. Our simulation results using NS3 simulator show that the proposed scheme performs well in terms of detection accuracy, false positive rate and mean detection delay.

[2]  Anal Patel,et al.  Defending against Wormhole Attack in MANET , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[3]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[6]  Vandana Dubey,et al.  Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).

[7]  Bharat K. Bhargava,et al.  E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[8]  Baek-Young Choi,et al.  Statistical wormhole detection for mobile sensor networks , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[9]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[10]  Gisung Kim,et al.  A Counterattack-Detection Scheme in Transmission Time-Based Wormhole Detection Methods , 2013, Int. J. Distributed Sens. Networks.

[11]  Vimal Kumar,et al.  Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET , 2016 .

[12]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[13]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[14]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[15]  Soo Young Shin,et al.  Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).

[16]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[17]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[18]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[19]  Chai Kiat Yeo,et al.  Statistical wormhole detection and localization in delay tolerant networks , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[20]  John S. Baras,et al.  Preventing wormhole attacks using physical layer authentication , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[21]  Varsha Singh,et al.  MAODV: Modified wormhole detection AODV protocol , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).