Wormhole Attacks Detection and Prevention Based on 2-Hop Neighbor in Wireless Mesh Networks ⋆
نویسندگان
چکیده
Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a high efficiency wormhole detection algorithm based on 2-hop neighbor in WMNs, which is called Wormhole Detection based on Neighbor’s Neighbor scheme (WDNN). Then a simple Random Walk Route scheme (RWR) is proposed to prevent routes from wormholes, which attract traffic of the routing protocols based on least cost. In WDNN, through enlarging the transmission range of the 2-hop neighbor, the faked network topology resulted by wormholes can be detected without using extra hardware or clock synchronization. In RWR, the route is chosen without using the low latency link which is created by wormholes. Security analysis shows that the wormhole attacks can be detected and also be prevented using our schemes efficiently. And our simulation results also indicate that our schemes can obtain a 100% wormhole detection rate and prevent routes from being attacked by the adversary against traditional routing protocols.
منابع مشابه
A survey on wormhole attacks on Wireless Mesh Networks and its detection
Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...
متن کاملA Secure Routing Algorithm for Underwater Wireless Sensor Networks
Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...
متن کاملبهبود پروتکل AODV جهت مقابله با حملات کرمچاله در شبکههای اقتضایی
Mobile Ad hoc Networks (MANET) are vulnerable to both active and passive attacks. The wormhole attack is one of the most severe security attacks in wireless ad hoc networks, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. In Wormhole attacks, one malicious node tunnels packets from its location to the ...
متن کاملAn Energy Efficient Approach for Wormhole Detection and Preventiony
Now these day multihop wireless Ad-hoc network suffer from number of security threat namely wormhole attack. Wormhole attacks make an tunnel that attracted all the communication over the network in order either scan message over packet , drop the packet or for unwanted consumption of battery power of Adhoc network. In this paper a wormhole detection and prevention scheme has been proposed in or...
متن کاملDefending against wormhole attacks in mobile ad hoc networks
In ad hoc networks, malicious nodes can carry wormhole attacks to fabricate a false scenario on neighbor relations among mobile nodes. The attacks threaten the safety of ad hoc routing protocols and some security enhancements. We propose a classification of the attacks according to the format of the wormholes. It establishes a basis on which the detection capability of the approaches can be ide...
متن کامل