Wormhole attacks in MANET

A mobile ad hoc network or MANET are those wireless networks which posses no infrastructure which are connected by the wireless nodes. And these nodes are generally mobile and the connectionless links are used basically to connect these nodes and these nodes have the capability to self organize and self configure and self arrangement capability. They are not having uniform structure. Because of their mobility and their dynamic nature they are prone to many kinds of malicious attacks by the malicious users because in this every node acts as a sender receiver and the router so no node can be able to understand whether the data has been sent by the malicious sender or the true sender or the receiving node is the true node. Hence by this the data can be lost as well as can be dropped by the malicious user and it can send the fake data to the receiver as well. So there are actually many kinds of attacks at the network layer. MANETS are generally more prone to cyber attacks rather than the wired networks because of their mobile nature. So these attacks like wormhole attacks are a very big issue in the case of networks. As the demand of wireless networks is increasing day by day. So it is a big concern of about how to prevent these kinds of attacks. So that they may not affect the network layer further. So in this paper we are focusing upon these attacks and also about how by using hardware rather than software we can solve the wormhole attacks by using cryptography and the digital signature method.

[1]  David C. Wyld,et al.  Advances in Computer Science, Engineering & Applications , 2012 .

[2]  Sajjad Abazari Aghdam,et al.  Collaborative techniques for detecting wormhole attack in MANETs , 2011, 2011 International Conference on Research and Innovation in Information Systems.

[3]  Subhashis Banerjee,et al.  WORMHOLE ATTACK MITIGATION IN MANET: A CLUSTER BASED AVOIDANCE TECHNIQUE , 2014 .

[4]  S. Nandi,et al.  M - learning in university campus scenario - Design and implementation issues , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).

[5]  Xiangke Liao,et al.  WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks , 2013, 2013 42nd International Conference on Parallel Processing.

[6]  Ravinder Singh Sawhney,et al.  Multi Hop Routing in Wireless Mobile Networks using Ant Colony Optimization , 2013 .

[7]  Devesh C. Jinwala,et al.  Prevention of Wormhole Attack in Wireless Sensor Network , 2011, ArXiv.

[8]  S. Albert Rabara,et al.  Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques - LP3 and NAWA2 , 2011 .

[9]  Anshika Garg,et al.  A Study on Wormhole Attack in MANET , 2014 .

[10]  John S. Baras,et al.  Wormhole detection using channel characteristics , 2012, 2012 IEEE International Conference on Communications (ICC).

[11]  E.A. Mary Anita,et al.  A certificate-based scheme to defend against worm hole attacks in multicast routing protocols for MANETs , 2010, 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES.

[12]  Z. A. Khan,et al.  Wormhole attack: A new detection technique , 2012, 2012 International Conference on Emerging Technologies.

[13]  Bo Wang,et al.  A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..

[14]  Djamel Djenouri,et al.  On Securing MANET Routing Protocol Against Control Packet Dropping , 2007, IEEE International Conference on Pervasive Services.

[15]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[16]  Zurina Mohd Hanapi,et al.  A review on wormhole attacks in MANET , 2015 .

[17]  Prashant Srivastava,et al.  Detection of Wormhole Attack using Hop-count and Time delay Analysis , 2012 .

[18]  Jorge Ortiz,et al.  Behavior of Elliptic Curve , 2011 .

[19]  Ashwin Gumaste,et al.  Message Scheduling on a Wormhole-Switched Linear Client-Server Network , 2006, ISCA PDCS.

[20]  Sheng Ma,et al.  A comprehensive comparison between virtual cut-through and wormhole routers for cache coherent Network on-Chips , 2014, IEICE Electron. Express.

[21]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Neelima Gupta,et al.  FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[23]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[24]  Paulo Veríssimo,et al.  Travelling through wormholes: a new look at distributed systems models , 2006, SIGA.

[25]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[26]  Soo Young Shin,et al.  Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation , 2012, 2012 International Conference on ICT Convergence (ICTC).

[27]  Brijesh Kumar Chaurasia,et al.  Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach , 2012 .

[28]  Pallapa Venkataram,et al.  Locating the Attacker of Wormhole Attack by Using the Honeypot , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[29]  Preeti Nagrath,et al.  Wormhole attacks in wireless adhoc networks and their counter measurements: A survey , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[30]  S. Smys,et al.  Efficient self-organized backbone formation in mobile ad hoc networks (MANETs) , 2012, Comput. Electr. Eng..

[31]  Gunhee Lee,et al.  An Effective Wormhole Attack Defence Method for a Smart Meter Mesh Network in an Intelligent Power Grid , 2012 .

[32]  Majid Khabbazian,et al.  Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[33]  Lin Yao,et al.  An efficient wormhole attack detection method in wireless sensor networks , 2014, Comput. Sci. Inf. Syst..

[34]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[35]  Venkateswara Nagar,et al.  Effectiveness of Intervention Strategies in Enhancing Self-Esteem among Engineering Students , 2012 .

[36]  Saadiah Yahya,et al.  Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[37]  Aashima Aashima,et al.  Detection and Prevention of Wormhole Attack in MANET Using DSR Protocol , 2014 .

[38]  Sanjay Keer,et al.  To prevent wormhole attacks using wireless protocol in MANET , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).

[39]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[40]  Jingjun Zhao,et al.  A Two-Phase Security Algorithm for Hierarchical Sensor Networks , 2011 .

[41]  Farrukh Aslam Khan,et al.  Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.

[42]  Teddy Mantoro,et al.  Mitigation of Wormhole Attack in Wireless Sensor Networks , 2012 .

[43]  Amarjit Malhotra,et al.  Wormhole attack prevention using clustering and digital signatures in reactive routing , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.

[44]  Cristina Alcaraz,et al.  A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[45]  Srdjan Capkun,et al.  Physical-Layer Identification of Wireless Devices , 2011 .

[46]  İnan Güler,et al.  A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .

[47]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[48]  Masayuki Nakamura,et al.  Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors , 2009 .

[49]  Rajni Dubey,et al.  Wormhole Attack in Mobile Ad-hoc Network: A Survey , 2015 .

[50]  Ali Movaghar-Rahimabadi,et al.  A two-phase wormhole attack detection scheme in MANETs , 2014, ISC Int. J. Inf. Secur..

[51]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[52]  P. Santhi Thilagam,et al.  Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network , 2011, ADCONS.

[53]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[54]  Makhlouf Aliouat,et al.  Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks , 2012, Trans. Emerg. Telecommun. Technol..

[55]  Muhammad Shoaib Siddiqui,et al.  Security Issues in Wireless Mesh Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[56]  Issa M. Khalil,et al.  LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.

[57]  Magdy S. El-Soudani,et al.  A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.

[58]  Jaroslaw Krygier,et al.  A trust-based information assurance mechanism for military mobile ad-hoc networks , 2014, 2014 20th International Conference on Microwaves, Radar and Wireless Communications (MIKON).

[59]  P. Anitha,et al.  Detection and Prevention of Wormhole Attacks in Manets Using Path Tracing , 2012 .

[60]  Rajpal Singh Khainwar,et al.  Elimination of Wormhole Attacker Node in MANET Using Performance Evaluation Multipath Algorithm , 2013 .

[61]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[62]  Adel Saeed Alshamrani PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.

[63]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[64]  Saurabh Upadhyay,et al.  Analysis of Wormhole Attack in AODV based MANET Using OPNET Simulator , 2012 .

[65]  F. Maan,et al.  Vulnerability assessment of AODV and SAODV routing protocols against network routing attacks and performance comparisons , 2011, 2011 Wireless Advanced.

[66]  M. Pushpalatha,et al.  A Graph-Theoretic Algorithm for Detection of Multiple Wormhole Attacks in Mobile Ad Hoc Networks , 2009 .

[67]  Saurabh Bagchi,et al.  MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.

[68]  Suresh Sankaranarayanan,et al.  Performance of Wireless Body Sensor based Mesh Network for Health Application , 2010 .

[69]  Bharat K. Bhargava,et al.  E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[70]  Chi-Sung Laih,et al.  A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.

[71]  A. L. Sangal,et al.  Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model , 2010 .

[72]  Nabendu Chaki,et al.  A comprehensive review on wormhole attacks in MANET , 2010, 2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM).

[73]  Vinodhini,et al.  Enhancing Key Management In Intrusion Detection System For Manets , 2012 .

[74]  Saurabh Upadhyay Avoiding Wormhole Attack in MANET using Statistical Analysis Approach , 2012 .

[75]  T. Arivoli,et al.  Improved location-free topology control protocol in MANET , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).

[76]  P. Santhi Thilagam,et al.  Taxonomy of Network Layer Attacks in Wireless Mesh Network , 2012 .

[77]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[78]  Eui-Nam Huh,et al.  A lightweight intrusion detection framework for wireless sensor networks , 2010, CMC 2010.

[79]  Hao Dong,et al.  Multi-hop routing optimization method based on improved ant algorithm for vehicle to roadside network , 2014 .

[80]  Li Gao,et al.  Grey theory based reputation system for secure neighbor discovery in wireless ad hoc networks , 2010, 2010 2nd International Conference on Future Computer and Communication.

[81]  Najma Farooq,et al.  Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks , 2014 .

[82]  Ali Modirkhazeni,et al.  Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.

[83]  Pawan Ahuja,et al.  Performance evaluation and comparison of AODV and DSR routing protocols in MANETs under wormhole attack , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).