CFP last date
20 January 2025
Reseach Article

Detecting Wormhole Attacks on Wireless Ad-hoc Networks: A Group based Approach

by Nagendra Kumar, Nagendra Kr. Mishra, Shubham Omar, Sandeep Saxena
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 28
Year of Publication: 2013
Authors: Nagendra Kumar, Nagendra Kr. Mishra, Shubham Omar, Sandeep Saxena
10.5120/12246-8299

Nagendra Kumar, Nagendra Kr. Mishra, Shubham Omar, Sandeep Saxena . Detecting Wormhole Attacks on Wireless Ad-hoc Networks: A Group based Approach. International Journal of Computer Applications. 69, 28 ( May 2013), 8-13. DOI=10.5120/12246-8299

@article{ 10.5120/12246-8299,
author = { Nagendra Kumar, Nagendra Kr. Mishra, Shubham Omar, Sandeep Saxena },
title = { Detecting Wormhole Attacks on Wireless Ad-hoc Networks: A Group based Approach },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 28 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 8-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number28/12246-8299/ },
doi = { 10.5120/12246-8299 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:30.840774+05:30
%A Nagendra Kumar
%A Nagendra Kr. Mishra
%A Shubham Omar
%A Sandeep Saxena
%T Detecting Wormhole Attacks on Wireless Ad-hoc Networks: A Group based Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 28
%P 8-13
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The ad-hoc networks are the temporarily established wireless networks which does not require fixed infrastructure it is also called as infrastructure less network. There is no central control authority in ad-hoc network. Because of some flaws of ad-hoc network such as shared wireless medium and lack of any central coordination makes them more prone to attacks in comparison with the wired network. It is peer to peer network. Among all the attacks wormhole attack is the most severe attack. In this attack an attacker capture the packets at one location in the network and send it to another attacker at a distant location through tunnels which is established through different ways like packet encapsulation, using high power transmission or by using direct antennas. This tunnel between two colluding attackers is virtual and it is called as a wormhole. The wormhole attack is possible even if the attacker has not comprised any hosts, and all communication provides authenticity and confidentiality. By using the various approaches for finding the solution over wormhole attack, the dynamic information of the packets could still be modified. So in order to give more robust protection in some special scenario like battlefields, which requires highly secured information, there is need of developing some secured mechanism for wormhole detection. Taking into consideration this problem the proposed scheme is developed. This paper discusses proposed works on wormhole attack along with comparison of different wormhole detection techniques in ad-hoc wireless network.

References
  1. Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks, in Proc. of INFOCOM 2003, San Francisco, CA, USA, April 2003.
  2. Marko Jahnke, Jens Toelle, Alexander Finkenbrink,. Alexander Wenzel, et. al; "Methodologies and Frameworks for Testing IDS in ad-hoc Networks"; Proceedings of the 3rd ACM workshop on QOS and security for wireless and mobile networks; Chania, Crete Island, Greece, Pages: 113 - 122, 2007.
  3. Y. -C. Hu, A. Perrig, D. B. Johnson; "Wormhole Attacks in Wireless Networks"; IEEE Journal on Selected Areas of Communications, vol. 24, numb. 2, pp. 370-380, 2006.
  4. F. Hong, L. Hong, C. Fu; "Secure OLSR"; 19th International Conference on Advanced Information Networking and Applications, AINA 2005, Vol. 1, 25-30, pp. 713-718, March 2005
  5. Y. -C. Hu, A. Perrig, D. B. Johnson; "Packet leashes: a defense against wormhole attacks in wireless networks"; INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communication Societies, Vol. 3, pp. 1976-1986, 2003.
  6. Y. -C. Hu, A. Perrig; "A Survey of Secure Wireless Ad Hoc Routing"; Security and Privacy Magazine, IEEE, vol. 2, issue 3, pp. 28-39, May 2004.
  7. C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing" in Proc. 2nd IEEE Workshop on Mobile Comput. Syst. Appl. , Feb. 1999, pp. 90–100.
  8. Yang, H. and Luo, H. and Ye, F. and Lu, S. and Zhang, U. ; "Security in Mobile Ad Hoc Networks: Challenges and Solutions"; Wireless Communications, IEEE, vol. 11, num. 1, pp. 38-47, 2004 .
  9. C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proc. 2nd IEEE Workshop on Mobile Comput. Syst. Appl. routing," in Proc. 2nd IEEE Workshop on Mobile Comput. Syst. Appl.
  10. A. Mishra, K. Nadkarni, A. Patcha; "Intrusion Detection in Wireless Ad Hoc Networks"; IEEE Wireless Communications, Vol 11, issue 1, pg. 48-60, February 2004.
  11. T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, A. Qayyum, L. Viennot; "Optimized Link State Routing Protocol"; Proceedings of IEEE INMIC, Pakistan 2001.
  12. D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.
  13. D. B. Johnson, D. A. Maltz, and J. Broch, "The dynamic source routing protocol for multihop wireless ad hoc networks," in Ad-Hoc Networking. Reading, MA: Addison-Wesley, 2001, ch. 5, pp. 139–172.
  14. L. Hong, C. Fu; "Secure OLSR"; 19th International Conference on Advanced Information Networking and Applications, AINA 2005, Vol. 1, 25-30, pp. 713-718, March 2005.
  15. S. Capkun, L. Buttyan, J. -P. Hubaux; "SECTOR: Secure Tracking of Node Encounters in Multi-Hop Wireless Networks"; Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks; 2003.
  16. Y-C Hu, A. Perrig, D. Johnson; "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols"; Proc. of WISE 2003, September 19, San Diego, California, USA, 2003.
  17. Korkmaz T. ; "Verifying Physical Presence of Neighbours against Replay-based Attacks in Wireless Ad Hoc Networks"; Proc. International Conference on Information Technology: Coding and Computing 2005, ITCC 2005, pp. 704-709, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

ad-hoc Networks Worm Hole Attack Wired & Wireless Networks Tunnel