CFP last date
20 December 2024
Reseach Article

A Cryptographic Handshaking Approach to Prevent Worm Hole Attack in MANET

by Vishal Pahal, Susheel Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 50 - Number 2
Year of Publication: 2012
Authors: Vishal Pahal, Susheel Kumar
10.5120/7744-0797

Vishal Pahal, Susheel Kumar . A Cryptographic Handshaking Approach to Prevent Worm Hole Attack in MANET. International Journal of Computer Applications. 50, 2 ( July 2012), 27-33. DOI=10.5120/7744-0797

@article{ 10.5120/7744-0797,
author = { Vishal Pahal, Susheel Kumar },
title = { A Cryptographic Handshaking Approach to Prevent Worm Hole Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 50 },
number = { 2 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 27-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume50/number2/7744-0797/ },
doi = { 10.5120/7744-0797 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:47:17.675957+05:30
%A Vishal Pahal
%A Susheel Kumar
%T A Cryptographic Handshaking Approach to Prevent Worm Hole Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 50
%N 2
%P 27-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A network always suffers from some active or passive attacks. These attacks results the data loss or the information reveal. In case of Dynamic wireless network there are more chances of such kind of attacks. One of such type of attack is Wormhole Attack. It is a tunnel based attack in which a pair of nodes forms a tunnel with false identification. The wormhole attack causes the delay transfer and information steal over the network. In this paper, we have presented the authentication approach to avoid the wormhole attack over the network. In this system we have provided 2 level of authentication using public key cryptography, one level is between node to base station and other between two mobile stations. Further to reduce the security risk from authorized node ,an eligibly test is done ,so that most eligible authorized node is choose for communication. In this work the clustered architecture is presented in which an authenticated tunnel is set between source to base station and base station to destination. The system will minimize the packet loss over the network with authenticity.

References
  1. Ephremides, Wieselthier, J. E. and Baker D. J. , "A design concept for reliable mobile radio networks with frequency hopping signaling," Proc. IEEE, vol. 75, no. 1, January 1987, pp. 56-73.
  2. Bhatnagar, A. and Robertazzi, T. G. , "Layer net: a new self-organizing network protocol," Proc IEEE Milcom'90, vol. 2, 30 September- 3 October 1990, pp. 845-849, 30.
  3. Alwan, A. , Bagrodia, R. and Bambos, N. et al. , "Adaptive mobile multimedia networks," IEEE Personal Commun, vol. 3, no. 2, April 1996, pp. 34-51.
  4. Liu, K. , Deng, J. , Varshney, P. K. and Balakrishnan, K. "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transaction on Mobile Computing, vol. 6, no. 5, May 2007, pp 536-550.
  5. Papadimitratos, P. and Z. J. Haas, "Secure link state routing for mobile ad hoc networks," Proc. IEEE Workshop on Security and Assurance in Ad Hoc Networks 2003, IEEE Press, pp. 27–31.
  6. Karlof, C. and Wagner, D. " Secure routing in wireless sensor networks: attacks and countermeasures," Elsevier's AdHoc Networks Journal, vol. 1, no. 2-3, September 2003, pp. 293-315,.
  7. Yang, C. L. , Tarng, W. , Hsieh, K. R. and Chen, M. "A security mechanism for clustered wireless sensor networks based on elliptic curve cryptography," IEEE SMC eNewsletter, Issue 33, December 2010.
  8. John, R. D. , "The sybil attack," Revised Papers from the First International Workshop on Peer-to-Peer Systems: IPTPS 2002, vol. 2429 of LNCS, pp. 251—260.
  9. Kumar, S. , Pahal, V. and Garg, S. ,"Wormhole attack in mobile ad hoc networks: a review," IRACST – Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498, vol. 2, no. 2, April 2012,pp 268-275.
  10. Hamid, A. and Hong, S. , "Defense against Lap-top Class Attacker in Wireless Sensor Network," 8th International conference on advance communication technology, ICACT , vol 1, 2006, pp. 318-323.
  11. Deswal, S. and Singh, S. , "Implementation of Routing Security Aspects in AODV", International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February 2010.
  12. Capkun, S. , Buttyan, L. and Hubaux, J. P. , "SECTOR: Secure tracking of node encounters in multi-hop wireless networks," Proceedings of the 1st ACM workshop on Security of ad-hoc and sensor networks (SASN 03), October 2003, pp. 21?32.
  13. Hu, L. and Evans, D. "Using directional antennas to prevent wormhole attacks," in Proceedings of 11th Network and Distributed System Security Symposium, NDSS' 04, San diego, February 2004, pp. 131?41. .
  14. Zhen, J. and Srinivas, S. "Preventing replay attacks for secure routing in ad hoc networks," Proc. of 2nd Ad Hoc Networks & Wireless (ADHOCNOW' 03), 2003, pp. 140--150.
  15. Buttyan, L. , Dora, L. and Vajda, I. , "Statistical wormhole detection in sensor networks," Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005) Visegrad, Hungary, July 13-14, 2005, pp. 128-141.
  16. Qian, L. , Song, N. and Li, X. , "Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path," Wireless Communications and Networking Conference 2005, IEEE, vol. 4, pp. 2106-2111,
  17. Phuong, T. V. , Canh, N. T. , Lee, Y. K. , Lee, S. and Lee, H, "Transmission time-based mechanism to detect wormhole attacks," IEEE Computer society, 2007, pp. 172-178.
  18. Wang, W. and Bhargava, B. , "Visualization of wormholes in sensor networks," Proceedings of the 2004 ACM workshop on Wireless security. ACM Press, 2004, pp. 51?60.
  19. Maheshwari, R. , Gao, J. and Das, S. R. , "Detecting wormhole attacks in wireless networks using connectivity information," Proc. of IEEE International Conference on Computer Communication, May 2007, pp. 107?15.
  20. Jen, S. M. , Laih, C. S. and Kuo, W. C. , "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET ," Sensors, vol. 9, 2009, pp. 5022-5039.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole Authentication Tunnel wireless cryptography