Detection Algorithms of the Wormhole Attacks in Manet

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2017 by IJPTT Journal
Volume-7 Issue-5
Year of Publication : 2017
Authors : Annie Ezhilarasi.M, Parthasarathy.P

Citation

Annie Ezhilarasi.M, Parthasarathy.P "Detection Algorithms of the Wormhole Attacks in Manet". International Journal of P2P Network Trends and Technology (IJPTT).V7:26-29 September to October 2017. ISSN:2249-2615. www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

Wireless networks are recognized to be liable to a assortment of Dos and DDOS attacks such as wormhole which reduces the quality of service in normal network operations. Lot of methods have been developed to identify and to preserve these kind of attacks. But these solutions mainly focus on attack-resilient rather than rooting out the source of attacks. Wormhole attacks can weaken or disable wireless sensor networks. MANET is severely affected by Distributed Denial of Service (DDoS) attacks which are the major problem for users of computer systems connected to the Internet. The wormhole attack is possible even if all communication provides legitimacy and secrecy. In the wormhole attack, an attacker slash packets at one location in the network, tunnels them to another location, and retransmits them there into the network. This can form a serious threat in wireless networks, including many ad hoc network routing protocols and location-based wireless security systems. An unique solution is developed to handle this integrity verification by forming the distributed and centralised wormhole detection algorithm for wireless networks. In this paper, we quantify wormhole’s demoralizing harmful crash on network coding system performance through experiments.

References

[1] S. Li, R. Yeung, and N. Cai, “Linear network coding,” IEEE Trans.Inf. Theory, vol. 49, no. 2, pp. 371–381, Feb. 2003. [2] T. Ho, M. Medard, R. Koetter, D. R. Karger, M. Effros, J. Shi, and B.Leong, “A random linear network coding approach to multicast,” IEEE Trans. Inf. Theory, vol. 52, no. 10, pp. 4413– 4430, Oct. 2006. [3] S. Biswas and R. Morris, “Opportunistic routing in multihop wireless networks,” ACM SIGCOMM Comput. Commun. Rev., vol. 34,pp. 69–74, Sep. 2004. [4] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft, “XORs in the air: Practical wireless network coding,” inProc. Conf. Appl., Technol., Archit. Protocols Comput. Commun., 2006, pp. 243–254. [5] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, “Trading structure for randomness in wireless opportunistic routing,” in Proc. Conf. Appl., Technol., Archit. Protocols Comput. Commun., Aug. 2007, pp. 169–180. [6] D. Dong, Y. Liu, X. Li, and X. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks,” IEEE Trans.Netw., vol. 19, no. 6, pp. 1787–1796, Dec. 2011. [7] J. Kim, D. Sterne, R. Hardy, R. K. Thomas, and L. Tong, “Timingbased localization of in-band wormhole tunnels in MANETs,” inProc. 3rd ACM Conf. Wireless Netw. Security, 2010, pp. 1–12. [8] S. R. D. R. Maheshwari, J. Gao, “Detecting wormhole attacks in Wireless networks using connectivity information,” in Proc. IEEE 26th Int. Conf Commun., 2007, pp. 107–115. [9] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Wormhole attacks in wireless networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 370–380, Feb. 2006. [10] R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Netw., vol. 13, no. 1, pp. 27–59, 2007. [11] A. J. Newell, R. Curtmola, and C. Nita-Rotaru, “Entropy attacks and countermeasures in wireless network coding,” in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw.,2012, pp. 185–196. [12] W. Wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against wormhole attacks in mobile ad hoc networks: Research articles,” Wireless Commun. Mobile Comput., vol. 6, no. 4, pp. 483–503, Jun.2006. [13] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE 23rd Annu. Joint Conf. IEEE Comput. Commun., Mar. 2003, pp. 1976–1986. [14] W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” in Proc. 3rd ACM Workshop Wireless Security, Oct. 2004, pp. 51–60. [15] J. Eriksson, S. Krishnamurthy, and M. Faloutsos, “Truelink: A practical countermeasure to the wormhole attack in wireless networks,” in Proc. IEEE Int. Conf. Netw. Protocols, 2006, pp. 75– 84. [16] S. _Capkun, L. Butty_an, and J.-P. Hubaux, “Sector: Secure tracking of node encounters in multi-hop wireless networks,” in Proc. 1st ACM Workshop Security Ad Hoc Sensor Netw., 2003, pp. 21–32. [17] D. S. J. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A high throughputpath metric for multi-hop wireless routing,” Wireless Netw., vol. 11, no. 4, pp. 419–434, 2005. [18] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K.Ramchandran, “Network coding for distributed storage systems,”IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4539– 4551,Sep. 2010. [19] A. S. Avestimehr, S. N. Diggavi, and D. N. Tse, “Wireless network information flow: A deterministic approach,” IEEE Trans. Inf. Theory, vol. 57, no. 4, pp. 1872–1905, Apr. 2011. [20] B. Nazer and M. Gastpar, “Compute-and-forward: Harnessing interference through structured codes,” IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 6463–6486, Oct. 2011. [21] P. Santi, “Topology control in wireless ad hoc and sensornetworks,” ACM Comput. Surv., vol. 37, no. 2, pp. 164–194, 2005. [22] F. Wu, T. Chen, S. Zhong, L. E. Li, and Y. R. Yang, “Incentive-compatible opportunistic routing for wireless networks,” in Proc. 14th ACM Int. Conf. Mobile Comput. Netw., 2008, pp. 303–314. [23] S. Lloyd, “Least squares quantization in PCM,” IEEE Trans. Inf. Theory, vol. IT-28, no. 2, pp. 129–137, Mar. 1982. [24] C. Cortes and V. Vapnik, “Support vector machine,” Mach. Learn., vol. 20, no. 3, pp. 273–297, 1995. [25] W. Hoeffding, “Probability inequalities for sums of bounded random variables,” J. Amer. Statist. Assoc., vol. 58, no. 301, pp. 13–30, 1963. [26] Beecrypt [Online]. Available: http://sourceforge.net/projects/ beecrypt/ [27] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM, vol. 21, no. 2, pp. 120–126, 1978. [28] R. Rivest, “The md5 message-digest algorithm,” RFC 1321, 1992. [29] J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defences against pollution attacks in intra-flow network coding for wireless mesh networks,” in Proc. ACM Conf. Security Privacy Wireless Mobile Netw., Mar. 2009, pp. 111–122. [30] T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, “Byzantine modification detection in multicast networks using randomized network coding,” in Proc. IEEE Int. Symp. Inf. Theory,Jan. 2004, p. 143. [31] Z. Li, D. Pu, W. Wang, and A. Wyglinski, “Forced collision: Detecting wormhole attacks with physical layer network coding,” Tsinghua Sci. Technol., vol. 16, no. 5, pp. 505–519, 2011. [32] I. Khalil, S. Bagchi, and N. B. Shroff, “Liteworp: A lightweight counter measure for the wormhole attack in multihop wireless networks,” in Proc. Int. Conf. Dependable Syst. Netw., Jul. 2005,pp. 612–621. [33] L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc network: A statistical analysisapproach,” J. Netw. Comput. Appl., vol. 30, no. 1, 2007. [34] L. Buttyan, L. Dora, and I. Vajda, “Statistical wormhole detection in sensor networks,” in Proc. Eur. Workshop Security Privacy Ad-Hoc Sensor Netw., Jul. 2005, pp. 128–141.

Keywords
MANET,DDoS,DoS,wormhole effect.