An Enhanced Integrated Solution for Identification and Elimination of Wormhole Attack in MANET

„Mobile ad hoc network (MANET)‟ is an infrastructure less, self controlled wireless network it doesn‟t need any centralized control so it can form and deform anywhere. Several freely movable mobile nodes with wireless connectivity can construct this type of network anywhere in no time, open connectivity and lack of central infrastructure enables the mobile nodes to freely exchange information and data with each other using radio signals. With this type of open connectivity and absence of centralized control MANET is vulnerable to many kinds of attacks and „wormhole attack‟ is also present in those attacks. It is the most powerful attack and very difficult to detect in „wormhole attack‟ two collaborating attacker nodes occupy strong strategic locations in two different ends of the network. By occupying dominant positions these two nodes can cover complete network and advertise to have the smallest route for transmitting data. The two attacker nodes are linked with a high speed wireless transmission link which is called wormhole tunnel. A very efficient solution of „wormhole attack‟ is discussed in this paper. The objective of our research work is to discover the alternative paths between the two communicating nodes. Then after calculating length of every alternative path we found that the length of alternative path is much larger than the path including wormhole tunnel.

[1]  Yurong Xu,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2007, Critical Infrastructure Protection.

[2]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.

[3]  Chander Diwaker,et al.  ATTACKS ON MOBILE AD-HOC NETWORKS , 2013 .

[4]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[5]  Khin Sandar Win,et al.  Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .

[6]  Ozan K. Tonguz,et al.  Ad Hoc Wireless Networks , 2005 .

[7]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[8]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[9]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[10]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[11]  A. Kush SECURITY AND REPUTATION SCHEMES IN AD-HOC NETWORKS ROUTING , 2009 .

[12]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[13]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[14]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[15]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[16]  Rajendra V. Boppana,et al.  On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.

[17]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[18]  Vijay Kumar,et al.  Worm_Secure Protocol for Wormhole Protection in AODV Routing Protocol , 2012 .