Top Banner
DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS MOJTABA GHANAATPISHEH SANAEI A project report submitted in partial fulfillment of the requirements for the award of the degree of Master of Computer Science (Information Security) Faculty of Computing Universiti Teknologi Malaysia JUNE 2013
24

ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

Jun 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

ii

DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS

MOJTABA GHANAATPISHEH SANAEI

A project report submitted in partial fulfillment of the

requirements for the award of the degree of

Master of Computer Science (Information Security)

Faculty of Computing

Universiti Teknologi Malaysia

JUNE 2013

Page 2: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

iv

Dedicated to my beloved mother,

my father and my kind sister

Page 3: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

v

ACKNOWLEDGEMENT

I wish to express my deepest appreciation to all those who helped me in one

way or another to complete this project. First and foremost I thank God almighty

who provided me with strength, direction and purpose throughout the project. Special

thanks to my project supervisor Dr. Ismail Fauzi Isnin for all his patience, guidance

and support during the execution of this project. Through his expert guidance, I was

able to overcome all the obstacles that I encountered in these enduring ten months of

my project. In fact he always gave me immense hope every time I consulted

with him over problems relating to my project. Even though my research area

wormhole detection; was not his specialty, not once did he fail to provide me the

duly needed assistance. Simply put his help was invaluable.

I take this opportunity to thank my friends for taking time out of their busy

schedule to help me. Last, I would like to thank the authority of Universiti

Teknologi Malaysia (UTM) for providing me with a good environment and

facilities such as computer laboratory to complete this project with software

which I need during process.

Page 4: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

vi

ABSTRACT

An ad-hoc network is a group of wireless mobile node that shapes a

temporary network without any infrastructure and centralized management. Each

mobile node functions are not only restricted to base station but also as router for

forwarding packets to other mobile nodes in the network. One primary application of

Mobile Ad-hoc Networks (MANETs) is for military purpose including the tactical

operations where security is often the major concern. The different leaks that threaten

the security of wireless network contain, selective forwarding, wormhole attack,

Sybil attack, sinkhole attack and black hole attack. One of the dangerous attacks in

mobile ad hoc network is named as wormhole attack in which two or more

destructive nodes record the packets at one point and transmits them by a wired or

wireless to another point in the network. Wormhole attack is so strong and detection

of this attack is hard. Also, the wormhole attack may cause another type of attacks

like Sinkhole or Select forwarding. The using a cryptographic technique is not

enough to prevent wormhole attack. So, in this study, a new method is proposed

based on modifying the forwarding packet process and also using a delay per hop

and expiry time technique to detect wormhole. The performance evaluation of the

proposed method is done using a mathematical modeling and simulation.

Page 5: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

vii

ABSTRAK

Rangkaian ‘ad-hoc’ adalah kumpulan nod mudah alih tanpa wayar yang

membentuk rangkaian sementara tanpa sebarang infrastruktur dan pengurusan

berpusat. Fungsi bagi setiap nod mudah alih bukan sahaja sebagai stesen pangkalan

tetapi juga sebagai laluan penghantaran paket untuk nod mudah alih yang lain di

dalam rangkaian. Satu kegunaan utama Rangkaian ad-hoc Mudah alih (Manet)

adalah dalam ketenteraan termasuk operasi taktikal. Dalam persekitaran ini

keselamatan sering membimbangkan. Pencerobohan yang berbeza telah mengancam

keselamatan rangkaian tanpa wayar merangkumi: penghantaran terpilih, serangan

‘wormhole’, serangan ‘Sybil’, serangan ‘sinkhole’ dan serangan ‘black hole’. Salah

satu serangan berbahaya dalam rangkaian ‘ad hoc’ mudah alih dinamakan serangan

‘wormhole’ yang mana dua atau lebih nod yang rosak merekodkan paket pada satu

titik, dan menghantar mereka melalui wayar atau tanpa wayar ke titik yang lain

dalam rangkaian. Serangan ‘worm hole’ begitu kuat dan untuk mengesan serangan

ini juga sukar. Selain itu, serangan ‘wormhole’ boleh menyebabkan satu lagi jenis

serangan seperti ‘Sinkhole’ atau Pilih penghantaran. Menggunakan teknik kriptografi

tidak cukup untuk mencegah serangan ‘wormhole’. Dalam kajian ini, satu kaedah

baru dicadangkan yang mana berdasarkan pengubahsuaian proses penghantaran

paket dan menggunakan kelewatan setiap hop dan teknik masa tamat untuk

mengesan ‘worm hole’. Penilaian prestasi kaedah yang dicadangkan dilakukan

dengan menggunakan model matematik dan simulasi.

Page 6: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

viii

TABLE OF CONTENTS

CHAPTER TITLE PAGE

DECLARATION iii

DEDICATION iv

ACKNOWLEDGMENT v

ABSTRACT vi

ABSTRAK vii

TABLE OF CONTENTS viii

LIST OF ABBREVIATION xiii

LIST OF TABLES xv

LIST OF FIGURES xvi

1 INTRODUCTION

1.1 Overview 1

1.2 Background of study 2

1.3 Statement of problem 4

1.4 Project objectives 5

1.5 Research questions 5

1.6 Project scope 6

1.7 Significance of the study 6

1.8 Summary 6

2 LITERATURE REVIEW

2.1 Introduction 7

2.2 Ad-hoc networks 8

2.2.1 Mobile ad-hoc networks (MANETs) 9

2.2.2 Wireless mesh network (WMN) 10

Page 7: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

ix

2.2.3 Wireless sensor network (WSN) 10

2.3 Routing protocols on MANETs 11

2.3.1 Destination sequenced distance vector

(DSDV) 11

2.3.2 Optimized link state routing (OLSR) 12

2.3.3 Secure ad-hoc distance vector (SEAD) 12

2.3.4 A secure on-demand routing protocol for ad-

hoc networks (Aridane) 13

2.3.5 Dynamic source routing (DSR) 13

2.3.6 Ad hoc on-demand distance vector (AODV) 14

2.4 Routing attacks on MANETs 15

2.4.1 Black hole attack 16

2.4.2 Byzantine attack 17

2.4.3 Rushing attack 17

2.4.4 Wormhole attack 18

2.4.4.1 Hidden attack 20

2.4.4.2 Exposed attack 20

2.5 MOBIWORP: Mitigation of the wormhole attack in

mobile multi-hop wireless networks 22

2.5.1 System model and assumptions identify the

malicious node 23

2.5.2 Local monitoring and node locations system

model and assumptions 23

2.5.3 Wormhole attack scenario mitigation 34

2.5.4 Secure node integration protocols 25

2.5.4.1 Fundamental structures for neighbor

determination protocols 25

2.5.4.2 Selfish move protocol (SMP) 26

2.5.4.3 Connectivity aided protocol with

constant velocity (CAP-CV) 26

2.5.4.4 Two specific attacks in MOBIWORP 26

2.5.4.4.1 False location information 27

2.5.4.4.2 DoS against MOBIWORP 27

2.5.5 Isolating a malicious node 27

2.6 Avoiding wormhole attack in MANET, using A hop

count analysis scheme 28

Page 8: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

x

2.7 A new cluster-based wormhole intrusion detection

algorithm for mobile ad-hoc 29

2.7.1 Assumptions 29

2.7.2 Cluster formation 30

2.7.3 Cluster based detection technique of worm-

hole attack in MANET 31

2.8 Detecting wormhole attacks in mobile ad-hoc net-

works through protocol breaking and packet timing

analysis 33

2.8.1 HELLO message intervals for intrusion detection 34

2.8.2 Maximum packet intervals 34

2.8.3 Detecting the attack before any traffic is lost 35

2.9 A novel trusted-base scheme to detect wormhole node 35

2.10 Wormhole attack prevention algorithm in mobile ad-

hoc networks (WAP) 36

2.10.1 WAP assumption 36

2.10.2 Neighbor node monitoring 37

2.10.3 Neighbor node table 38

2.10.4 Wormhole prevention timer 39

2.10.5 Wormhole route detection 40

2.10.6 Wormhole node list 41

2.11 Detecting wormhole attack with DelPHI method 41

2.12 Network simulation 2 (NS2) 43

2.13 Random waypoint model 43

2.14 User datagram protocol 44

2.15 Evaluation metrics 44

2.15.1 Throughput 44

2.16 Summary 44

3 RESEARCH METHODOLOGY

3.1 Introduction 50

3.2 Research design 50

3.3 Research technique 51

3.4 Research frame work 51

3.4.1 Information gathering 52

Page 9: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xi

3.4.1.1 Wormhole detection methods 52

3.4.1.2 Malicious nodes in wormhole 52

3.4.1.3 Routing protocol 53

3.4.2 Implement the WAP method and analyze 53

3.4.2.1 Network model 53

3.4.2.2 Simulation parameters 54

3.4.3 Propose a method to detect the wormhole 55

3.4.4 Compare and evaluate the performance of proposed

method with the original WAP 55

3.4.5 Report writing 55

3.5 Summary 55

4 DESIGN OF PROPOSED SCHEME

4.1 Introduction 56

4.2 Design 56

4.2.1 Initial premise 58

4.2.2 Broadcast the request packet 58

4.2.3 Information gathering 59

4.2.4 Destination 61

4.2.5 Processing to detect the malicious nodes 61

4.3 Summary 62

5 RESULTS ANALYSIS AND PROCEDURE

5.1 Introduction 63

5.2 Overview on implementation and design 63

5.3 Results of models in term of Throughput 67

5.3.1 The result of DSR routing protocol 67

5.3.2 The result of WAP method 68

5.3.3 New detection method technique 69

5.4 Over heading of the proposed method 71

5.5 Summary 72

6 CONCLUSION AND FUTURE WORK

6.1 Introduction 73

Page 10: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xii

6.2 Overview of the study 73

6.3 Suggestion for future work 76

6.4 Summary 76

7 REFERENCES 78

Page 11: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xiii

LIST OF ABBREVIATION

ANS Authentication of Node Scheme

AODV Ad hoc On-Demand Distance Vector

Aridane A Secure On-Demand Routing Protocol for Ad-hoc Network

BS Base Station

BSR Boundary State Routing

CBR Constant Bit Rate

DaW Defense against Wormhole

DelPHI Delay per hop indication

DoS Denial of Service

DPH Delay per Hop

DREP DelPHI Reply

DREQ DelPHI Request

DSDV Destination Sequenced Distance Vector

DSR Dynamic Source Routing

GNSS Global Navigation Satellite System

GPS Global Positioning System

HMAC Hash-based Message Authentication Code

HMTIs HELLO Message Timing Intervals

IP Internet Protocol

LEACH Low Energy Adaptive Clustering Hierarchy

MANET Mobile Ad-hoc Network

MEMS Micro Electro Mechanical Systems

NoN Number of Node

NS2 Network Simulation 2

OLSR Optimized Link State Routing Protocol

QoS Quality of Service

RREP Route Reply Packets

Page 12: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xiv

RREQ Route Request Packets

RRS Reverse Routing Scheme

RRT Round Trip Time

RWP Random Waypoint Model

SEAD Secure Ad-hoc Distance Vector

UDP User Datagram Protocol

VANET Vehicular Ad Hoc Network

WAP Wormhole Attack Prevention

WMN Wireless Mesh Network

WPT Wormhole Prevention Timer

WSN Wireless Sensor Network

Page 13: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xv

LIST OF TABLES

TABLE NO. TITLE PAGE

2.1 Vulnerabilities of DSR and AODV 15

2.2 Qualitative comparison of wormhole detection methods 46

3.1 Simulation parameters 54

4.1 Header of the discovery packet 59

Page 14: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xvi

LIST OF FIGURES

FIGURE NO. TITLE PAGE

2.1 Taxonomy of wormhole detection 8

2.2 Classification of wireless ad-hoc networks 9

2.3 Shows the black hole attack in AODV 16

2.4 Illustrating the rushing attack 18

2.5 The simple model of wormhole attack 19

2.6 Hidden attack 20

2.7 Exposed attack 21

2.8 X , M , N are guards of the link from X to A 24

2.9 A wormhole attack Scenario 25

2.10 The layered structure 31

2.11 Cluster based detection technique 32

2.12 Neighbor node monitoring without wormhole nodes 38

2.13 Neighbor node monitoring under wormhole nodes 38

2.14 Relationship of normal and tunneled paths 43

3.1 Framework 51

4.1 Flowchart of wormhole attack detection 57

4.2 Sample design of a proposed method to detect the wormhole 58

4.3 Source node monitoring of legitimate nodes 60

4.4 Source node monitoring of wormhole nodes 60

5.1 Network simulation environment consisting of 50 nodes 64

5.2 Comparison between source node and destination node 65

5.3 Nodes broadcasting 66

5.4 Source nodes forwarding the packet to the destination 67

5.5 Average rate of successful packet delivered by DSR routing

Protocol 68

Page 15: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

xvii

5.6 Average rate of successful packet delivered by WAP

method 69

5.7 The rate of throughput in the proposed method 70

Page 16: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

CHAPTER 1

INTRODUCTION

1.1 Overview

Nowadays, by the development of new technologies in the field of science,

especially in Micro Electro Mechanical Systems (MEMS), the applications of

wireless sensors are increasing rapidly. This application is widely used in militarily

monitoring, health monitoring and also for various other purposes.

Generally, the wireless sensor nodes are developed in an untrusted

environment. For this reason security becomes one of the important major concerns

in these small devices. Wireless mobile nodes usually suffers from security issues

such as leakage of secret information, eavesdropping, active interfering, data

tampering, message replay, message contamination and denial of service; also the

most secure algorithms that are proposed for this issue is not perfect. This study will

focuses on the aspects of wormhole attack and the ways to improve WAP

(Wormhole Attack Prevention) method as to find the hidden and exposed wormhole

attack in the mobile ad-hoc network. A wormhole is a kind of attack that typically

happens with two or more malicious nodes in which the first malicious node

eavesdrop or listen in packets at one location and then send them by tunnel to the

second malicious node in another area by direct link such as cable or strong wireless

communication like antenna or cellular broadcasting.

Page 17: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

2

The main goal of this project is to consider these characteristics and

behaviors of wormhole attack in MANETs, and the ways to improve the WAP

method in order to find the wormhole nodes.

1.2 Background of study

Due to the nature of wireless communications in MANETs, the security

problems are more than wired environments. Among the many attacks in wireless

network attack, a wormhole is one of the dangerous and specific attacks, that the

attacker does not require to exploit nodes in the network, and it can be done via the

route foundation method. Without any special environment assumptions, we can use

the MHA technique to analysis hop-count from the viewpoint of users. (Jen, Laih et

al. 2009) provided a new model to prevent wormhole attack in MANETs that called

Multipath wormhole attack analysis. In MHA three steps are needed: first, the hop-

count values of all routes should be considered. Then choose a reliable set of paths

for data transmission. Finally, send randomly packets through reliable routers,

according to decreasing the level of packet that is sent by wormhole. Even if the

wormhole is not avoided in some extreme situations, this method can still minimize

the level of using the route path through the wormhole. The best property of this

technique is no need a special hardware to well-done, it uses RFC3561, the AODV

routing protocol, to control packets and modify them to satisfy the requirements.

The primary goal in MOBIWORP technique was to provide primitives that

mitigate the wormhole attack in mobile ad hoc networks (Khalil, Bagchi et al. 2008).

Mitigation involves detection of the attack, diagnosis of the adversary nodes, and

nullifying their capability for further damage. Previous approaches to handling the

wormhole attack have concentrated on detection using specialized hardware (Hu and

Evans 2004) highly accurate time measurement, specialized trusted nodes and clock

synchronization. However, these may not be feasible for many large scale ad hoc or

sensor networks due to the hardware complexity or cost. Also importantly, all of

these approaches focus only on detecting and avoiding the attack but do not identify

Page 18: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

3

and neutralize malicious nodes. More recent work in a protocol called LITEWORP

(Khalil, Bagchi et al. 2005) has provided both detection and local isolation of

wormhole nodes. However, it breaks down in mobile scenarios. The limitation arises

from the inability to securely determine neighbors at arbitrary points in the lifetime

of the network.

A novel trusted-base scheme to detect wormhole node is presented by (Jain

and Jain 2010), where a trust model in the form of dynamic source routing (DSR)

was used to detect wormhole attack in the network. In DSR protocol the packet

contains the address list of each node that has to traverse. In this method the

wormhole attack is identified by using effort-return based trust model, which applies

DSR protocol to derive and calculate respective trust levels in other nodes.

Delay per hop indication method is presented by (Chiu and Lui 2006), and

called as (DelPHI). This method used the delay and hop count information to find

disjoint path between sender and receiver when wormhole attack is subjected to these

disjoint paths. The benefits are that DelPHI does not need any extra devices,

hardware and clock synchronization.

This WAP model introduced by (Choi et al. 2008), called as wormhole attack

prevention (WAP) is for preventing the wormhole attack. In this technique when

nodes send the request packets to destination, all nodes should monitor the

neighbor’s behavior, by using a special list called as neighbor list. After the respond

packet if received from source node, it can detect the path under wormhole attack

between all paths. “Once wormhole node is detected, source node records them in the

Wormhole List. Even though malicious nodes have been excluded from routing in

the past, the nodes have a good chance to attack once more.” So the WAP model

stores the information of the malicious nodes at the source node to avoid them taking

part in routing again. Furthermore, the WAP method can detect both hidden and

exposed attack without any extra devices.

Page 19: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

4

1.3 Statement of problem

Wormhole attack prevention (WAP) method is a detection method that works

on DSR routing protocol to identify the wormhole attack in the mobile ad hoc

network. The WAP model uses the neighbors monitoring to detect the wormhole.

The detection of wormhole in hidden mode is too easy but in exposed mode the

nodes play a role of legitimate nodes. Therefore if neighbor nodes of a route are

considered as malicious nodes, therefore it can be difficult to identify. The problem

statement in this project is to find the route under wormhole attack, while the attacker

node will play the legitimate nodes in one route to the destination. (Chiu and Lui

2006; Choi et al. 2008).

The different leaks that threaten the security of sensor network are

containing: selective forwarding, wormhole attack, Sybil attack, sinkhole attack and

black hole attack. Sinkhole attack occurs when the malicious node announces to node

in the network that have low distance to transmit the packets to the destination, so the

other node send the packets to malicious node and the traffic goes to the attacker

side. Sybil attack is like sinkhole attack, if the attacker is able to illustrate the fake

identification of other nodes. In selective forwarding the attacker, first attempts to be

reliable by the sender for forwarding the packets to malicious node and finally the

attacker select an optional dropping of the packets.

One of the important issues in wireless security is sensor nodes that have

been extended in an untrusted environment. In a wireless network if we do not have

any security, certainly the attackers can manipulate and compromise the security

(Cayirci and Rong 2008). “According to the sensor nodes they are faced with some

limitations such as limited memory, short power radios, almost complicated security

algorithms are not suitable and applicable for a long time to create a solution and to

provide a security unavoidable” (Sookhak et al. 2011).

Page 20: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

5

1.4 Project objectives

The objectives of this study include:

i. To review various methods on the detection of wormhole attack in ad-hoc.

ii. To implement the WAP model and analyze the performance.

iii. To propose a new method and compare the performance with original WAP.

1.5 Research questions

The research questions of this study are:

i. What are the issues for detecting wormhole attack in an Ad-hoc network?

ii. How to implement the wormhole attack detection and analyze the parameter?

1.6 Project scope

This study focuses on detecting the wormhole attack in the DSR routing

protocol of the MANET. The network of this study contains the malicious nodes that

play the role of route for sending the information from source node to the destination

node. Based on the WAP model when all the nodes on one route be a malicious one;

then the source node cannot identify, which routes are under wormhole attack.

Page 21: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

6

1.7 Significance of the study

In order to avoid wormhole attack, the nodes participating in the mobile ad

hoc network communication have to be registered in the network. Each node is

provided with unique ID which would help in maintaining the record of each and

every node participating in the network, but this situation enables the attacker to

compromise the network easily. Some prevention method exists to avoid this

problem but they often cannot be successful to avoid and prevent the attack, for this

reason the detection is offered to be collaborate with prevention, when the attacker

penetrates the network and prevention method could not avoid to influence the

attacker, so here the detection can identify and find the malicious person/node (Choi

et al. 2008).

1.8 Summary

In Chapter 1, the overview of the project along with problem backgrounds,

problem statements, objectives, research questions and scope of the study are

explained. The remaining parts of this study are prepared as follows: In chapter 2, the

literature review describes an overview of wormhole attack and several detection

methods in wormhole attack. In chapter 3, the proposed method against wormhole

attack is explained and finally in chapter 4 the design of the proposed method and

simulation method of the proposed method are explained.

Page 22: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

78

REFERENCES

Akyildiz, I. F., et al. (2005). "Wireless mesh networks: a survey." Computer

networks 47(4): 445-487.

Altman, E. and T. Jimenez (2003). "NS Simulator for beginners." Lecture notes.

Univ. de Los Andes, Merida, Venezuela and ESSI. Sophia-Antipolis, France.

Awerbuch, B., et al. (2008). "ODSBR: An on-demand secure Byzantine resilient

routing protocol for wireless ad hoc networks." ACM Transactions on

Information and System Security (TISSEC) 10(4): 6.

Awerbuch, B., et al. (2002). An on-demand secure routing protocol resilient to

byzantine failures. Proceedings of the 1st ACM workshop on Wireless security,

ACM.

Baras, J. S., et al. (2007). Intrusion detection system resiliency to byzantine attacks:

The case study of wormholes in OLSR. Military Communications Conference,

2007. MILCOM 2007. IEEE, IEEE.

Biswas, K. and M. L. Ali (2007). "Security threats in mobile ad hoc network."

Department of Interaction and System Design School of Engineering,

march2007: 9-26.

Cayirci, E. and C. Rong (2008). Security in wireless ad hoc and sensor networks,

Wiley.

Chiu, H. S. and K.-S. Lui (2006). DelPHI: wormhole detection mechanism for ad hoc

wireless networks. Wireless Pervasive Computing, 2006 1st International

Symposium on, IEEE.

Choi, S., et al. (2008). WAP: Wormhole attack prevention algorithm in mobile ad

hoc networks. Sensor Networks, Ubiquitous and Trustworthy Computing, 2008.

SUTC'08. IEEE International Conference on, IEEE.

Dananjayan, P., et al. "Energy Efficient and Secured Cluster Based Routing Protocol

for Wireless Sensor Networks."

Page 23: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

79

Das, R., et al. (2012). "Security Measures for Black Hole Attack in MANET: An

Approach." arXiv preprint arXiv:1206.3764.

Deng, H., et al. (2002). "Routing security in wireless ad hoc networks."

Communications Magazine, IEEE 40(10): 70-75.

Djenouri, D., et al. (2005). "A survey of security issues in mobile ad hoc networks."

IEEE communications surveys 7(4).

Giordano, S. (2002). "Mobile ad hoc networks." Handbook of wireless networks and

mobile computing: 325-346.

Gorlatova, M. A., et al. (2006). Detecting wormhole attacks in mobile ad hoc

networks through protocol breaking and packet timing analysis. Military

Communications Conference, 2006. MILCOM 2006. IEEE, IEEE.

Hartenstein, H. and K. P. Laberteaux (2008). "A tutorial survey on vehicular ad hoc

networks." Communications Magazine, IEEE 46(6): 164-171.

Hu, L. and D. Evans (2004). Using directional antennas to prevent wormhole attacks.

Network and Distributed System Security Symposium (NDSS), San Diego.

Hu, Y.-C., et al. (2003). "SEAD: Secure efficient distance vector routing for mobile

wireless ad hoc networks." Ad hoc networks 1(1): 175-192.

Hu, Y.-C., et al. (2003). Packet leashes: a defense against wormhole attacks in

wireless networks. INFOCOM 2003. Twenty-Second Annual Joint Conference

of the IEEE Computer and Communications. IEEE Societies, IEEE.

Hu, Y.-C., et al. (2005). "Ariadne: A secure on-demand routing protocol for ad hoc

networks." Wireless Networks 11(1-2): 21-38.

Ilyas, M. (2010). The handbook of ad hoc wireless networks, CRC press.

Jain, S. and S. Jain (2010). "Detection and prevention of wormhole attack in mobile

adhoc networks." networks 1793: 8201.

Jen, S.-M., et al. (2009). "A Hop-Count Analysis Scheme for Avoiding Wormhole

Attacks in MANET." Sensors 9(6): 5022-5039.

Kannhavong, B., et al. (2007). "A survey of routing attacks in mobile ad hoc

networks." Wireless Communications, IEEE 14(5): 85-91.

Karlof, C. and D. Wagner (2003). "Secure routing in wireless sensor networks:

Attacks and countermeasures." Ad hoc networks 1(2): 293-315.

Khalil, I., et al. (2005). LITEWORP: a lightweight countermeasure for the wormhole

attack in multihop wireless networks. Dependable Systems and Networks, 2005.

DSN 2005. Proceedings. International Conference on, IEEE.

Page 24: ii DETECTION OF WORMHOLE ATTACK IN MOBILE AD-HOC NETWORKS ...eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPi... · Sybil attack, sinkhole attack and black hole attack. One of the

80

Khalil, I., et al. (2008). "MOBIWORP: Mitigation of the wormhole attack in mobile

multihop wireless networks." Ad hoc networks 6(3): 344-362.

Marti, S., et al. (2000). Mitigating routing misbehavior in mobile ad hoc networks.

International Conference on Mobile Computing and Networking: Proceedings of

the 6 th annual international conference on Mobile computing and networking.

Naït-Abdesselam, F. (2008). "Detecting and avoiding wormhole attacks in wireless

ad hoc networks." Communications Magazine, IEEE 46(4): 127-133.

Ngadi, M., et al. (2008). "A review current routing attacks in mobile ad-hoc

networks." International Journal of Computer Science and Security 2(3): 18-29.

Papadimitratos, P. and Z. J. Haas (2002). Secure routing for mobile ad hoc networks.

Proceedings of the SCS Commnication Networks and Distributed Systems

Modeling and Simulation Conference (CNDS).

Roy, D. B., et al. (2010). "A new cluster-based wormhole intrusion detection

algorithm for mobile ad-hoc networks." arXiv preprint arXiv:1004.0587.

Sanzgiri, K., et al. (2002). A secure routing protocol for ad hoc networks. Network

Protocols, 2002. Proceedings. 10th IEEE International Conference on, IEEE.

Slijepcevic, S., et al. (2002). On communication security in wireless ad-hoc sensor

networks. Enabling Technologies: Infrastructure for Collaborative Enterprises,

2002. WET ICE 2002. Proceedings. Eleventh IEEE International Workshops on,

IEEE.

Sookhak, M., et al. (2011). "Detection Wormhole in Wireless Ad-hoc Networks."

International Journal of Computer Science and telecommunication 2(7): 7.

Vivian, D., et al. (2006). Evaluation of QoS Metrics in Ad Hoc Networks with the

use of Secure Routing Protocols. Network Operations and Management

Symposium, 2006. NOMS 2006. 10th IEEE/IFIP, IEEE.

Wang, X. and J. Wong (2007). An end-to-end detection of wormhole attack in

wireless ad-hoc networks. Computer Software and Applications Conference,

2007. COMPSAC 2007. 31st Annual International, IEEE.

Wu, B., et al. (2007). A survey of attacks and countermeasures in mobile ad hoc

networks. Wireless Network Security, Springer: 103-135.

Yang, H., et al. (2004). "Security in mobile ad hoc networks: challenges and

solutions." Wireless Communications, IEEE 11(1): 38-47.