CFP last date
20 June 2024
Reseach Article

A Defense against Wormhole Attacks in Wireless Ad hoc Networks using Cluster Technique

Published on April 2012 by Amol V. Zade, Vijaya K. Shandilya
Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
Foundation of Computer Science USA
ETCSIT - Number 2
April 2012
Authors: Amol V. Zade, Vijaya K. Shandilya
0087af40-4db6-4498-b15d-50f9f743a6ea

Amol V. Zade, Vijaya K. Shandilya . A Defense against Wormhole Attacks in Wireless Ad hoc Networks using Cluster Technique. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 2 (April 2012), 22-26.

@article{
author = { Amol V. Zade, Vijaya K. Shandilya },
title = { A Defense against Wormhole Attacks in Wireless Ad hoc Networks using Cluster Technique },
journal = { Emerging Trends in Computer Science and Information Technology (ETCSIT2012) },
issue_date = { April 2012 },
volume = { ETCSIT },
number = { 2 },
month = { April },
year = { 2012 },
issn = 0975-8887,
pages = { 22-26 },
numpages = 5,
url = { /proceedings/etcsit/number2/5972-1015/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%A Amol V. Zade
%A Vijaya K. Shandilya
%T A Defense against Wormhole Attacks in Wireless Ad hoc Networks using Cluster Technique
%J Emerging Trends in Computer Science and Information Technology (ETCSIT2012)
%@ 0975-8887
%V ETCSIT
%N 2
%P 22-26
%D 2012
%I International Journal of Computer Applications
Abstract

In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunately, the wormhole attack can hardly be defeated by cryptographical measures, as wormhole attackers do not create separate packets. We present a cluster based counter-measure for the wormhole attack that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. The Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions.

References
  1. Kuldeep Sharma, Dr. G. Mahadevan, "Advance Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", International Journal On Recent Trends in Engineering & Technology, Vol. 05, No. 01, Mar 2011
  2. Hu, Yih-Chun, Adrian Perrig and David B. Johnson. "Wormhole attacks in wireless networks", IEEE journal on selected areas in communications, vol. 24, no. 2, february 2006, 0733-8716
  3. Lazos, L. ; Poovendran, R. ; Meadows, C. ; Syverson, P. ; Chang, L. W. "Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In IEEE WCNC 2005, Seattle, WA, USA, 2005; pp. 1193–1199.
  4. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki," a new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks", International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.
  5. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah," MANET Routing Protocols and Wormhole Attack against AODV", International Journal of Computer Science and Network Security, VOL. 10 No. 4, April 2010.
  6. Hu, Lingxuan and David Evans. "Using Directional Antennas to Prevent Wormhole Attacks", In Network and Distributed System Security Symposium (NDSS 2004), San Diego, California, USA. February 2004.
  7. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru "Mitigating Byzantine Attacks in Ad Hoc Wireless Networks", March 2004
  8. G. A. Pegueno and J. R. Rivera, "Extension to MAC 802. 11 for performance Improvement in MANET", Karlstads University, Sweden, December 2006.
  9. C. Wei, L. Xiang, B. yuebin and G. Xiaopeng, "A New Solution for Resisting Gray Hole Attack in Mobile Ad Hoc Networks," Second International Conference on Communications and Networking in china, pp. 366-370, Aug, 2007.
  10. Shang-Ming Jen, Chi-Sung Laih and Wen-Chung Kuo , A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET, Sensors 2009, 9, 5022-5039.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Wormhole Attack Cluster Guard Node