Emerging Trends in Computer Science and Information Technology (ETCSIT2012) |
Foundation of Computer Science USA |
ETCSIT - Number 2 |
April 2012 |
Authors: Amol V. Zade, Vijaya K. Shandilya |
0087af40-4db6-4498-b15d-50f9f743a6ea |
Amol V. Zade, Vijaya K. Shandilya . A Defense against Wormhole Attacks in Wireless Ad hoc Networks using Cluster Technique. Emerging Trends in Computer Science and Information Technology (ETCSIT2012). ETCSIT, 2 (April 2012), 22-26.
In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunately, the wormhole attack can hardly be defeated by cryptographical measures, as wormhole attackers do not create separate packets. We present a cluster based counter-measure for the wormhole attack that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. The Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. We also discuss previous works which require the role of administrator and their reliance on impractical assumptions.