CFP last date
20 December 2024
Reseach Article

A Lightweight Technique to Prevent Wormhole Attacks in AODV

by Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 6
Year of Publication: 2014
Authors: Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William
10.5120/18203-9328

Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William . A Lightweight Technique to Prevent Wormhole Attacks in AODV. International Journal of Computer Applications. 104, 6 ( October 2014), 1-9. DOI=10.5120/18203-9328

@article{ 10.5120/18203-9328,
author = { Hosny M. Ibrahim, Nagwa M. Omar, Ebram K. William },
title = { A Lightweight Technique to Prevent Wormhole Attacks in AODV },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 6 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number6/18203-9328/ },
doi = { 10.5120/18203-9328 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:25.846310+05:30
%A Hosny M. Ibrahim
%A Nagwa M. Omar
%A Ebram K. William
%T A Lightweight Technique to Prevent Wormhole Attacks in AODV
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 6
%P 1-9
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc network (MANET) is vulnerable to many types of routing attacks due to its dynamic topology and the collaboration of MANET nodes in finding routing paths. The wormhole attack is considered one of the most threatening attacks. The most popular MANET routing protocols such as ad hoc on demand distance victor (AODV) are vulnerable to this security threat. In this paper, a lightweight technique is proposed to detect and prevent wormhole attacks in AODV using a mobile reliable backbone network. The backbone network monitors the behavior of MANET nodes to judge their reliability. The simulation results using NS2 show that the proposed technique can efficiently prevent wormhole attacks.

References
  1. S. Basagni, M. Conti, S. Giordano, and I. Stojmenovic, "Mobile ad hoc networking", Wiley, 2004.
  2. C. E. Perkins, E. Beliding-Royer, S. Das, "Ad hoc on-demand distance vector (AODV) routing", IETF Internet Draft, MANET working group, Jan. 2004.
  3. N. Badache, D. Djenouri, and A. Derhab, "Mobility impact on mobile ad hoc routing protocols", ACS/IEEE International Conference on AICCSA, Vol. 3, 2003.
  4. M. Su, "WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks", Journal of Computer & Security, Elsevier, Vol. 29, No. 2, pp. 208-224, 2010.
  5. J. Von Mulert, I. Welch, and W. K. Seah, "Security threats and solutions in MANETs: A case study using AODV and SAODV", Journal of Network and Computer Applications, Elsevier, Vol. 35, No. 4, pp. 1249-1259, 2012.
  6. The Network Simulator ns-2, http://www. isi. edu/nsnam/ns/.
  7. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, and A. Jamalipour, "A survey of routing attacks in mobile ad hoc networks", Journal of Wireless communications, IEEE,Vol. 14, No. 5, pp. 85-91, 2007.
  8. D. Cerri, and A. Ghioni, "Securing AODV: the A-SAODV secure routing prototype", Communications Magazine, IEEE, Vol. 46, No. 2, pp. 120-125, 2008.
  9. I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a Lightweight countermeasure for the wormhole attack in multihop wireless networks", Proceedings of the international conference on dependable systems and networks (DSN'05), IEEE, pp. 612-621, 2005.
  10. Y. C. Hu, A. Perrig, and D. B. Johnson, "Wormhole Attacks in Wireless Networks", IEEE Journal on Selected Areas in Communications, IEEE, Vol. 24, No. 2, 2006.
  11. Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks", In INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, Vol. 3, pp. 1976-1986, 2003.
  12. J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks", Proceedings of the 2006 14th IEEE International Conference on in Network Protocols (ICNP'06), IEEE, pp. 75-84, 2006.
  13. X. Wang, and J. Wong, "An end-to-end detection of wormhole attack in wireless ad-hoc networks", In Computer Software and Applications Conference (COMPSAC), IEEE, Vol. 1, pp. 39-48, 2007.
  14. Hu, L. , and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks", Proceedings of Network and Distributed System Security Symposium (NDSS), 2004.
  15. I. Khalil, S. Bagchi, and N. B. Shroff, "MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks", Journal of Ad Hoc Networks, Elsevier, Vol. 6, No. 3, pp. 344-362, 2008.
  16. M. A. Azer, S. M. El-Kassas, A. W. F. Hassan, and M. S. El-Soudani, "Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme", IEEE Conference on Availability, Reliability and Security (ARES 08), pp. 636-641, 2008.
  17. M. R. Alam, and K. S. Chan, "RTT-TC: A topological comparison based method to detect wormhole attacks in MANET", IEEE Conference on Communication Technology (ICCT), pp. 991-994, 2010.
  18. F. Shi, D. Jin, W. Liu, and J. Song, "Time-based detection and location of wormhole attacks in wireless ad hoc networks", IEEE conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 1721-1726, 2011.
  19. M. Poturalski, P. Papadimitratos, and J. P. Hubaux, "Secure neighbor discovery in wireless networks: formal investigation of possibility", ACM symposium on Information, computer and communications security, pp. 189-200, 2008.
  20. S. Hariharan, N. B. Shroff, and S. Bagchi, "Secure neighbor discovery through overhearing in static multihop wireless networks", Journal of Computer Networks, Elsevier, Vol. 55, No. 6, pp. 1229-1241, 2011.
  21. T. Dimitriou, and A. Giannetsos, "Wormholes no more? localized wormhole detection and prevention in wireless networks", Springer conference on Distributed Computing in Sensor Systems, pp. 334-347, 2010.
  22. S. M. Glass, V. Muthukkumarasamy, and M. Portmann, "Detecting man-in-the-middle and wormhole attacks in wireless mesh networks", IEEE conference on Advanced Information Networking and Applications (AINA'09), pp. 530-538, 2009.
  23. L. F. Garcia, and J. M. Robert, "Preventing layer-3 wormhole attacks in ad-hoc networks with multipath DSR", IEEE Ad Hoc Networking Workshop (Med-Hoc-Net 2009), pp. 15-20, 2009.
  24. Sahu, K. R. , and D. N. S. Chaudhari, "Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network", International Journal of Electronics and Computer Science Engineering (IJECSE, ISSN: 2277-1956), Vol. 1, No. 04, pp. 2362-2367, 2012.
  25. Zhen, J. , and S. Srinivas, "Preventing replay attacks for secure routing in ad hoc networks", Proceedings of Ad-Hoc, Mobile, and Wireless Networks, Springer, pp. 140-150, 2003.
  26. R. S. Khainwar, A. Jain, and J. P. Tyagi, "Elimination of Wormhole Attacker node in MANET using performance evaluation multipath algorithm", Journal of Network and Complex Systems, IISTE, Vol. 3, No. 7, pp. 22-29, 2013.
  27. I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: a Lightweight countermeasure for the wormhole attack in multihop wireless networks", Proceedings of the international conference on dependable systems and networks (DSN'05), IEEE, pp. 612-621, 2005.
  28. C. Bettstetter, G. Resta, and P. Santi, "The node distribution of the random waypoint mobility model for wireless ad hoc networks", IEEE Transactions on Mobile Computing, Vol. 2, No. 3, pp. 257-269, 2003.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Attacks Security AODV MANET.