Confirmation of wormhole attack in MANETs using honeypot

The flexibility and ease of deployment provided by Mobile Ad hoc Networks (MANETs) come at the cost of lack of security and vulnerability. Many solutions are proposed to protect MANET from attacks, ranging from attack identification to prevention. Although these solutions reduce the attacks in a MANET, they are likely to identify many false attacks as real ones. Such false alarms occur more often when an attack is complex and have multiple features, for example in a wormhole attack. In this paper we propose a Wormhole Attack Confirmation (WAC) System using honeypot to mitigate false alarms in a MANET and protect its resources. The confirmation of attacks dictates the necessity of analyzing all the possible scenarios of the attack. In order to analyze the wormhole attack we have built a Wormhole Attack Tree based on its symptoms. The honeypot confirms the wormhole attack using the Wormhole Attack Tree (WAT) and history of attacks. We have simulated the proposed system in several MANET environments of varying sizes of nodes and applications. On several occasions the results have demonstrated that the proposed system is efficient in confirming the wormhole attack, thereby saving the resources and minimizing the path re-establishment. (C) 2018 Elsevier Ltd. All rights reserved.

[1]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[2]  Shahram Jamali,et al.  DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system , 2017, The Journal of Supercomputing.

[3]  Nei Kato,et al.  A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[4]  Asaf Shabtai,et al.  Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.

[5]  Sheng Zhong,et al.  Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.

[6]  A. Amara Korba,et al.  Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.

[7]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[8]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[9]  Tassos Dimitriou,et al.  LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks , 2014, J. Comput. Syst. Sci..

[10]  Peter C. Mason,et al.  Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning , 2014, IEEE Transactions on Vehicular Technology.

[11]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[12]  Muhammad Imran,et al.  A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..

[13]  Isaac Woungang,et al.  Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.

[14]  Yuan Zhang,et al.  Research on Improved DV-HOP Algorithm against Wormhole Attacks in WSN , 2016 .

[15]  Paolo Bellavista,et al.  Convergence of MANET and WSN in IoT Urban Scenarios , 2013, IEEE Sensors Journal.

[16]  Chu-Hsing Lin,et al.  Lifetime elongation of ad hoc networks under flooding attack using power-saving technique , 2014, Ad Hoc Networks.

[17]  Zhongcheng Li,et al.  TOHIP: A topology-hiding multipath routing protocol in mobile ad hoc networks , 2014, Ad Hoc Networks.

[18]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[19]  Olga Gadyatskaya,et al.  Attack Trees for Practical Security Assessment: Ranking of Attack Scenarios with ADTool 2.0 , 2016, QEST.

[20]  Sudhir Bagade,et al.  JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET , 2016, ICISS.

[21]  Anastasios A. Economides,et al.  EyeSim: A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs , 2016, 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC).

[22]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[23]  Al-Sakib Khan Pathan Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .

[24]  Magdy S. El-Soudani,et al.  A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.

[25]  Esmaeil Kheirkhah,et al.  Security challenges in mobile ad hoc networks: a survey , 2015, ArXiv.