Wormhole Detection and Prevention Scheme using Beacon Node Mechanism with Neighbor Node Discovery
نویسندگان
چکیده
The wormhole attack is considered a serious threat to the security in multi-hop ad hoc networks. In wormhole attack, the attacker makes the tunnel from one end to another network, the nodes are in a different place at both ends of the tunnel believe are true neighbours and gets the conversation through the wormhole link . Unlike many other ad hoc routing attacks, worm hole attack cannot be prevented by cryptographic solutions because intruders or create new or modify existing packages, but before existing. In this paper a simple technique to effectively detect attacks wormholes without any special hardware and / or location or timing of the stringent requirements proposed. The proposed technique allows the use of the variance in routing information between neighbours to detect wormholes. Basic thesis is to find the alternative path from the source to the second jump and calculate the number of hops to detect wormhole.
منابع مشابه
An Energy Efficient Approach for Wormhole Detection and Preventiony
Now these day multihop wireless Ad-hoc network suffer from number of security threat namely wormhole attack. Wormhole attacks make an tunnel that attracted all the communication over the network in order either scan message over packet , drop the packet or for unwanted consumption of battery power of Adhoc network. In this paper a wormhole detection and prevention scheme has been proposed in or...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملSecure Neighbor Verification Protocol in Wireless Mesh Networks
The main motivation of an attacker is to convince two far away nodes as neighbor nodes using wormhole attack easily without the knowledge of cryptographic primitives. Thus, it can significantly degrade the performance of Wireless Mesh Networks (WMNs). Secure neighbor discovery is a fundamental requirement of network nodes to ensure secure data communication. An adversary that bypass neighbor di...
متن کاملDetecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes
This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes ar...
متن کامل