Securing Layer - 3 Wormhole Attacks in Ad - Hoc Networks
نویسندگان
چکیده
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbour relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them (possibly selectively) to another location, and retransmits them there into the network. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, we present a new approach for detecting wormhole attacks. The Witness Integration Multipath protocol is based on the Multipath DSR routing protocol and finds suspicious behavior related to wormhole attacks.
منابع مشابه
Preventing Collaborative Wormhole Attacks In AODV-based Mobile Ad-Hoc Networks
Preventing Collaborative Wormhole Attacks on AODV-Based Mobile Ad Hoc Networks c ©Vincent Koo, 2012 Master of Science Computer Science Ryerson University Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملSecuring DSR against wormhole attacks in multirate ad hoc networks
A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks w...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecuring MANET against Wormhole Attack using Neighbor Node Analysis
In mobile ad hoc networks (MANETs) security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile ad hoc networks in which a pair of colluding nodes make...
متن کامل