Modeling the Wormhole Attack in Underwater Sensor Network

In underwater sensor network, security becomes a primary concern in order to provide protected communication. In this paper, we present a novel network simulation component, wormhole attack, in NS2,for underwater sensor networks, after analyzing the current methods of simulating wormhole attack. The core idea of wormhole implementation is making a "tunnel" between two malicious nodes. If this "tunnel" is built on normal wireless or wired channel,there would be some unexpected channel loss. So in order to solve the problem, we selected the existing wired object Link, in the NS2 wired simulation package, to simulate the "tunnel" by copying the local packets and directly sending them to the wormhole object installed in a remote node. Experimental results demonstrate the effectiveness of the wormhole components in NS2 worked smoothly and comply with the actual.

[1]  Reza Curtmola,et al.  On the Survivability of Routing Protocols in Ad Hoc Wireless Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[2]  Peng Xie,et al.  VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks , 2006, Networking.

[3]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[4]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[5]  Reza Curtmola,et al.  ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.

[6]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.