A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks

The infrastructure of a Mobile Ad hoc Network (MANET) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. However, almost all common routing protocols at present consider performance as first priority, and have little defense capability against the malicious nodes. Many researches have proposed various protocols of higher safety to defend against attacks; however, each has specific defense objects, and is unable to defend against particular attacks. Of all the types of attacks, the wormhole attack poses the greatest threat and is very difficult to prevent; therefore, this paper focuses on the wormhole attack, by combing three techniques. So that our proposed scheme has three techniques based on hop count, decision anomaly, neighbor list count methods are combined to detect and isolate wormhole attacks in ad hoc networks. That manages how the nodes are going to behave and which to route the packets in secured way.

[1]  Magdy S. El-Soudani,et al.  Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[2]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Brahim Bensaou,et al.  Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[4]  Xia Wang Intrusion Detection Techniques in Wireless Ad Hoc Networks , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).

[5]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[6]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[7]  M.A. Gorlatova,et al.  Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[8]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[9]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[10]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[11]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[12]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[13]  J. Broach,et al.  The dynamic source routing protocol for mobile ad-hoc networks , 1998 .

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[16]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[17]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[18]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[19]  Gunhee Lee,et al.  An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).