Advertisement

Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data

  • Harsh Kishore MishraEmail author
  • Meenakshi Mittal
Conference paper
  • 212 Downloads
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 141)

Abstract

Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The wormhole attack is believed to be one of the malicious attacks to detect as it can be performed without breaching any key or breaking any cipher in any wireless ad hoc network. A wormhole attack form a tunnel in the network using two or more malicious nodes to replay the data stealthily from one malicious node to other malicious end nodes in same or different network. In this way, the ad hoc networks are exploited by the attacker by either using the flaws in protocol design or in network architecture. So, there is requirement of security methods to make MANET routing protocols thwarting wormhole attack. In this research work, the wormhole attack has been performed over AODV and DSR protocols using the real-time live data introduced in simulator. The prevention technique was noted to successfully handling the attack by restoring the performance of network and alleviates the effect of attack from the network.

Keywords

Ad hoc networks Routing protocols Ad hoc on-demand distance vector routing (AODV) Dynamic source routing (DSR) Wormhole attack Network simulator 

References

  1. 1.
    Aarti, D.S.T.: Study of manet: characteristics, challenges, application and security attacks. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(5), 252–257 (2013)Google Scholar
  2. 2.
    Abosamra, A., Hashem, M., Darwish, G.: Securing DSR with mobile agents in wireless ad hoc networks. Egypt. Inform. J. 12(1), 29–36 (2011)CrossRefGoogle Scholar
  3. 3.
    Azer, M.A., El-Kassas, S., El-Soudani, M.S.: An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks. In: Paper Presented at the 2010 International Conference on Networking, Sensing and Control (ICNSC) (2010)Google Scholar
  4. 4.
    Chen, H., Lou, W., Wang, Z.: Secure localization against wormhole attacks using conflicting sets. In: Paper Presented at the IEEE 29th International Performance Computing and Communications Conference (IPCCC) (2010)Google Scholar
  5. 5.
    Dong, D., Li, M., Liu, Y., Li, X.-Y., Liao, X.: Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Trans. Netw. (TON) 19(6), 1787–1796 (2011)CrossRefGoogle Scholar
  6. 6.
    Dong, D., Li, Z., Liu, Y., Liao, X.: Wormcircle: connectivity-based wormhole detection in wireless ad hoc and sensor networks. In: Paper Presented at the 15th International Conference on Parallel and Distributed Systems (ICPADS) (2009)Google Scholar
  7. 7.
    Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: a practical countermeasure to the wormhole attack in wireless networks. In: Paper Presented at the Proceedings of the 2006 14th IEEE International Conference on Network Protocols, 2006. ICNP’06 (2006)Google Scholar
  8. 8.
    Goyal, P., Parmar, V., Rishi, R.: Manet: vulnerabilities, challenges, attacks, applicationGoogle Scholar
  9. 9.
    Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Paper Presented at the NDSS (2004)Google Scholar
  10. 10.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Paper Presented at the INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies (2003)Google Scholar
  11. 11.
    Johnson, D., Hu, Y., Maltz, D.: DSR: RFC 4728 (2010)Google Scholar
  12. 12.
    Khalil, I., Bagchi, S., Shroff, N.B.: MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw. 6(3), 344–362 (2008)CrossRefGoogle Scholar
  13. 13.
    Kuosmanen, P.: Classification of ad hoc routing protocols (2002)Google Scholar
  14. 14.
    Lazos, L., Poovendran, R., Meadows, C., Syverson, P., Chang, L.: Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In: Paper Presented at the Wireless Communications and Networking Conference, 2005 IEEE (2005)Google Scholar
  15. 15.
    Mahrenholz, D., Ivanov, S.: Adjusting the ns-2 emulation mode to a live network. In: Paper Presented at the Kommunikation in Verteilten Systemen (KiVS) (2005)Google Scholar
  16. 16.
    Maltz, D.B.J.D.A., Broch, J.: DSR: The Dynamic source routing protocol for multi-hop wireless ad-hoc networks. In: Computer Science Department Carnegie Mellon University Pittsburgh, PA, 15213-13891 (2001)Google Scholar
  17. 17.
    Network emulation with the NS simulator. retrieved from www.isi.edu website: http://www.isi.edu/nsnam/ns/ns-emulation.html
  18. 18.
    Ojha, M., Kushwah, R.S.: Impact and performance analysis of wormhole attack on AODV in MANET using NS2Google Scholar
  19. 19.
    Perkins, C., Belding-Royer, E., Das, S.: RFC 3561-ad hoc on-demand distance vector (AODV) routing. In: Internet RFCs, pp. 1−38 (2003)Google Scholar
  20. 20.
    Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–592 (2013)CrossRefGoogle Scholar
  21. 21.
    Sharma, P., Trivedi, A.: An approach to defend against wormhole attack in ad hoc network using digital signature. In: Paper Presented at the IEEE 3rd International Conference on Communication Software and Networks (ICCSN) (2011)Google Scholar
  22. 22.
    Sheikh, R., Singh Chande, M., Mishra, D.K.: Security issues in MANET: a review. In: Paper presented at the Seventh International Conference on Wireless and Optical Communications Networks (WOCN) (2010)Google Scholar
  23. 23.
    Shin, J.-Y., Jang, J.-W., Kim, J.-M.: Result based on NS2, simulation, and emulation verification. In: Paper Presented at the International Conference on New Trends in Information and Service Science, 2009. NISS’09 (2009)Google Scholar
  24. 24.
    Singh, Y., Khatkar, A., Rani, P., Deepika, D., Barak, D.D.: Wormhole attack avoidance technique in mobile adhoc networks. In: Paper Presented at the 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT) (6–7 April 2013)Google Scholar
  25. 25.
    Soni, S.J., Nayak, S.D.: Enhancing security features & performance of AODV protocol under attack for MANET. In: Paper Presented at the International Conference on Intelligent Systems and Signal Processing (ISSP) (2013)Google Scholar
  26. 26.
    Upadhyay, S., Chaurasia, B.K.: Impact of wormhole attacks on Manets. Int. J. Comput. Sci. Emerg. Technol. 2(1), 77–82 (2011)Google Scholar
  27. 27.
    Vani, A., Rao, D.S.: A simple algorithm for detection and removal of wormhole attacks for secure routing in ad hoc wireless networks. Int. J. Comput. Sci. Eng. (IJCSE) 3(6), 2377–2384 (2011)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Centre for Computer Science and Technology, Central University of PunjabBathindaIndia

Personalised recommendations