CFP last date
20 December 2024
Reseach Article

Prevention of Wormhole Attack in Ad-Hoc Network

Published on December 2011 by Pallavi Sharma, Prof. Aditya Trivedi
International Conference on Electronics, Information and Communication Engineering
Foundation of Computer Science USA
ICEICE - Number 5
December 2011
Authors: Pallavi Sharma, Prof. Aditya Trivedi
1dfa18ed-00e7-4256-b0da-12cbc5860bbb

Pallavi Sharma, Prof. Aditya Trivedi . Prevention of Wormhole Attack in Ad-Hoc Network. International Conference on Electronics, Information and Communication Engineering. ICEICE, 5 (December 2011), 13-17.

@article{
author = { Pallavi Sharma, Prof. Aditya Trivedi },
title = { Prevention of Wormhole Attack in Ad-Hoc Network },
journal = { International Conference on Electronics, Information and Communication Engineering },
issue_date = { December 2011 },
volume = { ICEICE },
number = { 5 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 13-17 },
numpages = 5,
url = { /specialissues/iceice/number5/4303-iceice036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Electronics, Information and Communication Engineering
%A Pallavi Sharma
%A Prof. Aditya Trivedi
%T Prevention of Wormhole Attack in Ad-Hoc Network
%J International Conference on Electronics, Information and Communication Engineering
%@ 0975-8887
%V ICEICE
%N 5
%P 13-17
%D 2011
%I International Journal of Computer Applications
Abstract

Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. They also have capability of network partition. The Wormhole attack is the most attention seeking attack in ad hoc networks; it consists of two malicious nodes and a tunnel between malicious nodes. In wormhole attack, attacker records the packets at one location and tunnels them in another location in same network or in different network. In this paper, we present a mechanism which is helpful for detection and defend against wormhole attack in ad hoc network is”multipath hop counting analysis” (MHA) in which accepting all route request at destination node with in a fixed time period called time to live (TTL) period and then verification of digital signature of sending node by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. In proposed solution, if sender wants to send the data to destination, firstly it creates a secure path between sender and receiver with the help of multipath hop count analysis with verification of digital signature. If there is presence of any malicious node in between the path then it is identified because malicious node does not have its own legal digital signature.

References
  1. M. Bouhorma, H. Bentaouit and A. Boudhir, “Performance Comparison of Ad-Hoc Routing Protocols AODV and DSR,” in Multimedia Comput¬ing and Systems, 2009. ICMCS’09, pp. 511-514, 2009.
  2. Y.C Hu, A. Perrig and D. Johnson, “Wormhole Attack in Wireless Networks,” IEEE JSAC, vol. 24, no. 2, Feb. 2006.
  3. David L. Mills, “A Computer-Controlled LORAN-C Receiver for Precision Time Keeping,” Technical Report 92-3-1, Department of Electrical and Computer Engineering, University of Delaware, DE, March 1992.
  4. David L. Mills, “A Precision Radio Clock for WWV Transmissions”, Technical Report 97-8-1, Department of Electrical and Computer Engineering, university of Dalware, DE, August 1997.
  5. om Clark, “Tom Clark’s Totally Accurate Clock FTP Site. Greenbelt, Maryland.” ftp://aleph.gsfc.nasa.gov/GPS/totally.accurate.clock/.
  6. Defense Advanced Research Projects Agency www.mil/ato/solicit/baa01-01faqv4.doc, October (2000).
  7. I. Khalil, S. Bagchi, N.B. shroff, “LiteWorp: Detection and isolation of the wormhole in static mulihop wireless network. Journal,” Acm: The international Journal of Computer and Telecommunications Networking Archive, Vol. 51, Issue 13, September 2007.
  8. H. Vu, A. Kulkarni, N. Mittal, “WOMEROS: A new framework for defending against wormhole attacks on wireless ad hoc networks,” in WASA 2008, LNCS 5258, pp. 491-502, 2008.
  9. I. Khalil, S. Bagchi, N.B. Shroff, “MOBIWORP: Mitigation of wormhole attack in mobile multihop wireless networks,” in Direct Science: Ad Hoc Networks6 (2008), pp. 344-362, Feb. 2007.
  10. xL. Hu and D. Evans, “Using Directional Antennas to Prevent Wormhole Attacks,” in Proc. Network and Distributed System Symposium (NDSS), San Diego, USA, Feb 2004.
  11. M. Correia, N. Ferreira, L.C. Lung, “Worm-IT -A Wormhole based intrusion-tolerant group communication system,” in Science Direct: The Journal of system and Software 80, 2007, pp. 178-197, March 2006.
  12. M. Jain, H. Kandwal, “A Survey on Complex Wormhole Attack in Wireless Ad-Hoc Network,” in Advances in Computing, Control & Telecommunication Technologies, pp. 555-558, 2009.
  13. xE. Poornima, C. S. Bindu, SK. Munwar, “Detection and a prevention of Layer-3 Wormhole Attack on Boundary State Routing in Ad Hoc Networks,” In International Conference on Advances in Computer En¬gineering (ACE), Banglore, Karnataka, India, pp. 48-53, June 2010.
  14. Azer, M. A. El-Kassas, S.M. El-Soudani, M.S, “ Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks,” Systems and Networks Communications, ICSNC ’09, pp. 30-35, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile ad hoc network wormhole attack digital signatures multipath hop count analysis (MHA)