Intra level intra cluster Wormhole attack  

Intra level intra cluster Wormhole attack  

Source publication
Article
Full-text available
A Mobile Ad-Hoc Network (MANET) is a self configuring, infrastructure less network of mobile devices connected by wireless links. Loopholes like wireless medium, lack of a fixed infrastructure, dynamic topology, rapid deployment practices, and the hostile environments in which they may be deployed, make MANET vulnerable to a wide range of security...

Similar publications

Conference Paper
Full-text available
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from th...
Article
Full-text available
Mobile ad hoc networks are regarded as a group of networks consisted of wireless systems which developing together a network with self-arrangement capability. no constant communication infrastructure and use central nodes to communicate with other nodes. Despite lots of advantages, these networks face severe security challenges, since their channel...
Article
Full-text available
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they...
Article
Full-text available
It is knotty for current routing protocols to meet the needs of reliable data diffusion during the Internet of Things (IoT) deployments. Due to the random placement, limited resources and unattended features of existing sensor nodes, the wireless transmissions are easily exposed to unauthorized users, which becomes a vulnerable area for various mal...

Citations

... AODV cyber intrusion takes place in the realms of the routing layer. An intrusion is a premeditated attempt to compromise the confidentiality, integrity and availability of a network resource [7]. Intrusion, therefore, interrupts, intercepts, and modifies normal information and communication flow in a network as well as the fabrication of false data. ...
Article
Full-text available
This study proposes a nature-based system survivability model. The model was simulated, and its performance was evaluated for the mobile ad hoc wireless networks. The survivability model was used to enable mobile wireless distributed systems to keep on delivering packets during their stated missions in a timely manner in the presence of attacks. A prey-predator communal defence algorithm was developed and fused with the Ad hoc On-demand Distance Vector (AODV) protocol. The mathematical equations for the proposed model were formulated using the Lotka-Volterra theory of ecology. The model deployed a security mechanism for intrusion detection in three vulnerable sections of the AODV protocol. The model simulation was performed using MATLAB for the mathematical model evaluation and using OMNET++ for protocol performance testing. The MATLAB simulation results, which used empirical and field data, have established that the adapted Lotka-Volterra-based equations adequately represent network defense using the communal algorithm. Using the number of active nodes as a measure of throughput after attack (with a maximum throughput of 250 units), the proposed model had a throughput of 230 units while under attack and the intrusion was nullified within 2 seconds. The OMNET++ results for protocol simulation that use throughput, delivery ratio, network delay, and load as performance metrics with the OMNET++ embedded datasets showed good performance of the model, which was better than the existing conventional survivability systems. The comparison of the proposed model with the existing model is also presented. The study concludes that the proposed communal defence model was effective in protecting the entire routing layer (layer 2) of the AODV protocol when exposed to diverse forms of intrusion attacks.
... At the same time, it is not an easy job to do. Examples of WSNs applications include: Battlefield [1] such as (identification of enemy capabilities and positions, and recognizing soldier activities in the field [2], In hospitals for health care [3] [4], in roads for traffic monitoring [5] [6], railway bridge monitoring [7], disasters detection (such as fire [8], volcano [9] , landslide, or earthquake [10]), identification of lowlevel point radiation sources [11], air pollution detection and monitoring [12], atmospheric observation [12] [13], wildlife animals observation [14], and smart agriculture systems [15]. ...
Article
Full-text available
Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without physical guarding duty. That makes the network susceptible to physical attacks. The communication nature between sensor nodes is another reason, where intruders can easily send/receive information if they are located in the network communication range. In this paper, most of the possible WSN attacks are discussed, different security services expected in WSN are explained, and trust-based solutions proposed in the literature are listed. Moreover, the state-of-the-art of the attacks’ mitigation and avoidance techniques are presented. Besides, this paper is enriched with a new classification of the WSNs attacks regarding attacks’ characteristics. It will be beneficial to researchers in the field of WSNs security if they can distinguish between different attacks that have common characteristics.
... In cluster-based approach [5], authors have divided the entire network into three layers and every layer has its cluster head. Through the wormhole link, RREQ message arrive destination node faster and does not contain the Ids of cluster heads in its header as compare to RREQ message which follow legal path and containing the Ids of cluster heads in its header. ...
... This approach can handle only long radio range attackers. Another technique based upon the same feature as [5] is [4] Barman et al. [51] have proposed a cluster-based algorithm for the detection of wormhole intrusion. This is based upon RTT concept where guard nodes are placed at inner layer. ...
Article
Full-text available
Wireless ad hoc networks getting rapid popularity and new domain like IOTs, IOVs, mobile cloud computing are asking for new security protocols for different layers of network stack. Network layer is one of the most important layers provided with routing function. Among various different attacks on routing, wormhole is the most treacherous one, which is possible without getting access of cryptographic information. The aim of this smart review is to explore wormhole mitigation techniques along with their strengths and limitations. This review will help the reader to design and develop new secure routing protocols for the new paradigms of wireless ad hoc networks.
... In cluster-based approach [5], authors have divided the entire network into three layers and every layer has its cluster head. Through the wormhole link, RREQ message arrive destination node faster and does not contain the Ids of cluster heads in its header as compare to RREQ message which follow legal path and containing the Ids of cluster heads in its header. ...
... This approach can handle only long radio range attackers. Another technique based upon the same feature as [5] is [4] Barman et al. [51] have proposed a cluster-based algorithm for the detection of wormhole intrusion. This is based upon RTT concept where guard nodes are placed at inner layer. ...
Conference Paper
Due to increased use of smartphones in enterprise setup several security threats have also been penetrated in it. Threats and risks become increased, especially when these smartphones get connected to enterprise network via GSM, GPRS, Bluetooth or Wi-Fi. Security researchers are also working on offering best security solutions against these threats and attacks. This area is less explored yet; that is why, we have carried out a survey to explore the latest, in-practice, state-of-the-art security policies, standards, solution and mechanisms for corporate environments. Study will help secure personal as well as enterprise information and applications on smartphones against latest threats and risks.
Article
Full-text available
A Mobile Adhoc Network (MANET) is a collection of self configurable mobile nodes that are connected through wireless links. Lack of centralized controller is difficult to determine the reliable and secure communication in Mobile Adhoc network. A Wormhole attack establishes a path between sender and receiver, if the sender have started the data transmission, the wormhole attack creates a direct link to another node , that link refers to a wormhole tunnel, i.e trusted nodes are successful in data communication process. The aim of the research, is to describe a technique that can effectively detect the wormhole attacks using Mobility and Expected Transmission Count (METX) using overhearing factor. The proposed technique allows the use of variances in routing information between neighbours to detect wormhole attack. Basic proposal is to find the highest throughput path to detect wormhole attack and to find alternative path from the source to destination. The alternative path is determined under the basis of link duration. To calculate mobility values, each node keeps historical information of its neighbours which leads to resource usage and computational complexity. To keep the neighbour nodes in relationship, the overhearing factor is used. The result of the proposed method is to provide secure as well as reliable communication and simulate through network simulator-2 and analyze the network behaviour in attack and reduces the end-to end delay. .