Modification in routing mechanism of AODV for defending blackhole and wormhole attacks

There are serious security issues in mobile ad hoc networks due to its wireless transmissions. The fact that mobile ad-hoc networks (MANET) lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary's malicious attacks. The paper proposes protocols which will protect ad hoc networks from blackhole and wormhole attacks and to improve network stability. This paper presents an intrusion detection system based on the concept of specification-based detection system to detect and prevent blackhole attacks. This paper also presents a hop count analysis approach to detect wormhole attacks along routes in ad hoc networks. The proposed protocol does not require any location information, time synchronization, or special hardware to detect wormhole attacks. The protocols are evaluated using analysis and simulations on network simulator.

[1]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[2]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[3]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[4]  Mehdi Medadian,et al.  Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).

[5]  İnan Güler,et al.  A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .

[6]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[7]  Liu Fagui,et al.  Research & implementation of uCLinux-based embedded browser , 2007 .

[8]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[9]  Ming-Yang Su,et al.  Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks , 2010, International Symposium on Parallel and Distributed Processing with Applications.

[10]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[11]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[12]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[13]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[14]  Yibeltal Fantahun Alem,et al.  Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.

[15]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .