INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.5, No.8, Jun. 2013

A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer

Full Text (PDF, 510KB), PP.28-38


Views:74   Downloads:4

Author(s)

Maria Sebastian,Arun Raj Kumar P.

Index Terms

MANET, Wormhole attack, RTT, Transitory buffer

Abstract

Nowadays, the computing and communication services are accessed while on the move. Setting up of fixed access points and backbone infrastructure is not always viable. So in order to provide communication where there is lack of infrastructure or inconvenience in using the existing infrastructure, Mobile Adhoc Networks (MANETs) are used. This inherent flexibility allows MANETs to be used for a wide range of applications such as rescue operations, military applications, vehicular communication, and business meetings. As there is no apriori trust relationship between the nodes of an ad hoc network and basic network functions like packet forwarding and routing are performed by the available nodes, security is an essential component in MANETs. Various attacks in MANETs are blackhole attack, byzantine attack, resource consumption attack, rushing attack, and wormhole attack. Wormhole attack is a severe threat among the other threats in MANET. Existing solutions to detect wormhole attacks include Packet Leashes, SECTOR, DelPHI, RTT-TC, TTM, etc. These solutions require special hardware or strict synchronized clocks or cause message overhead. Some solutions do not locate the wormhole, and some other may generate false alarms or does not consider network congestion into account. In this paper, wormhole attack detection is proposed based on RTT between successive nodes and congestion detection mechanism. If the RTT between two successive nodes is higher than the threshold value, a wormhole attack is suspected. If a wormhole is suspected, node's transitory buffer is probed to determine whether the long delay between the nodes is due to wormhole or not, as delays can be caused due to congestion or by queuing delays. The proposed method prevents both the hidden and the exposed attack. Advantage of our proposed solution is that it does not require any specialized hardware or synchronized clocks.

Cite This Paper

Maria Sebastian,Arun Raj Kumar P.,"A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer", IJCNIS, vol.5, no.8, pp.28-38,2013. DOI: 10.5815/ijcnis.2013.08.04

Reference

[1] Yih-Chun Hu, Adrian Perrig, and David B. Johnson," Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," In Proceedings of the IEEE Conference on Computer Communications (Infocom), 2003, p. 1976-1986.

[2] L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," In Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004

[3] Hon Sun Chiu and King-Shan Lui, "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks," International Symposium on Wireless Pervasive Computing (ISWPC), 2006.

[4] T Phuong Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee, and Heejo Lee, "Transmission time-based mechanism to detect wormhole attack," In Proceedings of the IEEE Asia-Pacific Service Computing Conference, Dec. 11-14, 2007, p. 172-178.

[5] Mohammad Rafiqul Alam and King Sun Chan, "RTT-TC: A Topological Comparison Based Method to Detect Wormhole Attacks in MANET," 12th IEEE International Conference on Communication Technology, 2010, p. 991-994.

[6] S. Capkun, L. Buttyan, and J.P. Hubaux., "SECTOR: Secure tracking of node encounters in multi-hop wireless networks," In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 03), 2003, p.21–32.

[7] Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, and Bhavin I. Shah, "MANET Routing Protocols and Wormhole Attack against AODV," International Journal of Computer Science and Network Security (IJCSNS), vol 10 No.4, April 2010, p. 12-18.

[8] Amrit Suman, Praneet Saurabh, and Bhupendra Verma, "A Behavioral Study of Wormhole Attack in Routing for MANET," International Journal of Computer Applications (0975 – 8887), vol 26 No.10, July 2011, p. 42-46.

[9] C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, IETF Network Working Group, July 2003.

[10] T. Senthil kumaran, Dr. V Sankaranarayanan, "Early detection Congestion and Control Routing in Manet," In Proceedings of Seventh International Conference on Wireless and Optical Communication Networks, Sept 2010, p 1-5.

[11] Ns2 simulator http://www.isi.edu/nsnam/ns/.