Figure 1 - available via license: CC BY
Content may be subject to copyright.
Source publication
MANET, due to the nature of wireless transmission, has more security issues compared to wired environments. A specific type of attack, the Wormhole attack does not require exploiting any nodes in the network and can interfere with the route establishment process. Instead of detecting wormholes from the role of administrators as in previous methods,...
Context in source publication
Similar publications
Ad Hoc network connections with mobile nodes and its individual uniqueness like lively topology, multi-hop communications and simple network setup, faced plenty of confronts in routing, and security issues. The security disputes arise due to wireless self-arrangements and self-protection competence. In the background of ad hoc networks, there is an...
Presently, wireless sensor network localization algorithms attracted various researchers toward research study and experiments . The location of nodes can be determined by various localization algorithms. These wireless sensor network localization algorithms are vulnerable and can be compromised for their security. There are various network securit...
To improve the security of wireless sensor networks, the experiment proposes a network security improvement method based on multi-objective ant colony optimization and single-path secure routing protocol. First, LEAP is used to improve the single-path secure routing algorithm to enhance the security of data during transmission; then, a multi-object...
A mobile ad hoc network consists of individual mobile nodes communicating via wireless link. The node which refuses to share their own resources but gets benefit from other nodes, are called selfish or misbehaving nodes. The nodes in MANET are mobile with changing topologies. Performance of network may get affected due to these selfish nodes like s...
In Wireless Senor Networks, security is the most significant issue when sending such an essential message via wireless connection. This helps attackers to access the network and execute several potential attacks to intercept or modify real data/information. Because network sensors do not have routers, the same routing protocol must be split by all...
Citations
... In this scenario, a higher-level virtual tunnel is established by two or more malicious network nodes that are conspiring together. This tunnel is then exploited for the transit of packets between the ends of the tunnel [22]. It emulates the shorter links in the network and hence acts as a benefit to unsuspicious network nodes through default search for shorter routes. ...
... These positions are updated using Eq. (21) and Eq.(22). ...
The Internet of Things (IoT) is considered a significant innovation by researchers and industry leaders, offering significant advancements in daily life through the use of smart objects that communicate with one another over the internet. Moreover, because IoT devices are resource-constrained and low-cost, implementing an effective security model has emerged as a major technical challenge in recent years. Among the security threats to wireless networks, the wormhole attack is a particularly important and vulnerable issue, as it can disrupt various routing protocols through its activation in various modes. In the transmission of data from a source node to a destination node in network, compromised nodes, also known as wormhole nodes or attackers, may leak or alter the routing information of a specific path. These paths, which contain malicious nodes, are referred to as wormhole paths. To enhance security in IoT, it is crucial to identify and secure such paths. This research presents a novel model aimed at detecting and preventing wormhole attacks to ensure the secure transmission of data in IoT networks. The proposed model comprises two main phases: (a) the detection phase which utilizes an adaptive Deep Neural Network (DNN) based on the Crow Search with Bird Swarm Optimization (CS-BSO) algorithm to detect wormhole attacks across k-different paths, and (b) the prevention phase which utilizes the CS-BSO algorithm in combination with the Bird Swarm Algorithm (BSA) and Crow Search Algorithm (CSA) to determine the optimal path for data transmission. This optimal path selection is based on a multi-objective function that considers network parameters such as delay or latency, energy, packet loss ratio, distance, and throughput, effectively protecting the network from wormhole attacks.
... Hop count is also a wormhole detection feature, while some technique uses hop count as a hybrid feature with time and location. Average time for single hop is calculated by dividing total hops by total distance [124]. ...
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topolog-ical area for more flexibility and accurate results.
... In effect, it can create transmission delay in UIoT networks. Wormhole attack: An attacker uses two malicious nodes to tunnel traffic through the UIoT networks in a wormhole attack [49][50][51][52]. The two plotting nodes capture packets at one end and block them at another end. ...
... In effect, it causes packet loss or transmission delay [46][47][48]. Wormhole attack: An attacker uses two malicious nodes to tunnel traffic through the UIoT networks in a wormhole attack [49][50][51][52]. The two plotting nodes capture packets at one end and block them at another end. ...
Owing to the hasty growth of communication technologies in the Underwater Internet of Things (UIoT), many researchers and industries focus on enhancing the existing technologies of UIoT systems for developing numerous applications such as oceanography, diver networks monitoring, deep-sea exploration and early warning systems. In a constrained UIoT environment, communication media such as acoustic, infrared (IR), visible light, radiofrequency (RF) and magnet induction (MI) are generally used to transmit information via digitally linked underwater devices. However, each medium has its technical limitations: for example, the acoustic medium has challenges such as narrow-channel bandwidth, low data rate, high cost, etc., and optical medium has challenges such as high absorption, scattering, long-distance data transmission, etc. Moreover, the malicious node can steal the underwater data by employing blackhole attacks, routing attacks, Sybil attacks, etc. Furthermore, due to heavyweight, the existing privacy and security mechanism of the terrestrial internet of things (IoT) cannot be applied directly to UIoT environment. Hence, this paper aims to provide a systematic review of recent trends, applications, communication technologies, challenges, security threats and privacy issues of UIoT system. Additionally, this paper highlights the methods of preventing the technical challenges and security attacks of the UIoT environment. Finally, this systematic review contributes much to the profit of researchers to analyze and improve the performance of services in UIoT applications.
... High exposure and dynamic topology of open networking technologies causes potential loss of data and/or abuse of privacy. For reliable and authentic delivery of messages in a network consisting of N routers between the communicating parties, sometimes it is required that a message passes through a certain number, say N routers before it is delivered to the intended recipient (Jen et al. 2009). In this process, if one intermediate networking entity fails, forwarding of a message to the next intermediate entity and its eventual delivery to the intended recipient is obstructed. ...
Proxy re-encryption (PRE) is a public-key cryptography primitive that delegates the decryption capabilities of a user (called delegator) to another user (called delegatee) using a re-encryption key. A semi-trusted proxy uses the re-encryption key to transform a ciphertext under the delegator’s public key such that it becomes a ciphertext under the delegatee’s public key. If instead of “all”, a delegator wishes to delegate a subset of his decryption capabilities, there is a need for elevating the level of trust in the re-encrypting proxy. As a result, PRE in multi-proxy scenario has received significant research attention in recent times. In this paper, we introduce a new PRE primitive in a multi-proxy setting called Threshold Progressive Proxy Re-encryption (TP-PRE), that involves progressive transformation of ciphertext and results in production of a valid re-encrypted ciphertext if and only if at least t out of the total N distinct proxies perform re-encryption. The way these proxies are selected for re-encryption is significantly different from the existing threshold proxy cryptosystems. The TP-PRE scheme we present does not require prior knowledge about the available proxies. Proxies can take turn in any order to progressively transform the ciphertext and output of tth transformation, or any transformation(s) afterward, is the final re-encrypted ciphertext that can be successfully decrypted by the intended delegatee to obtain the correct underlying plaintext. Unlike conventional threshold cryptosystems, TP-PRE does not have a share combination phase hence it does not require any central dealer. We formally define system model and security notions for TP-PRE. We present a concrete construction for TP-PRE that satisfies indistinguishability under chosen-plaintext attacks (IND-CPA) and formally prove its security. We analyze the performance of our construction by providing theoretical bounds of the solution along with the results of practical implementation.
... One specific direction of study that proved to be very useful in solving different problems related to the optimization of mobile networks consists in the application of game-theoretic methods [2,3]. Another important aspect is related to the resilience analysis of such networks, [4][5][6], see also the papers [7,8], where the issue of network resilience is addressed using the game-theoretic methods. ...
Abstract: In this contribution we consider the problem of optimal drone positioning for improving the operation of a mobile ad hoc network. We build upon our previous results devoted to the application of game-theoretic methods for computing optimal strategies. One specific problem that arises in this context is that the optimal solution cannot be uniquely determined. In this case, one has to use some other criteria to choose the best (in some sense) of all optimal solutions. It is argued that centrality measures as well as node ranking can provide a good criterion for the selection of a unique solution. We showed that for two specific networks most criteria yielded the same solution, thus demonstrating good coherence in their predictions.
... The wormhole attacks in Ad hoc Networks are described in [1,11,14,16,25] several types of packet tunneling wormhole attacks, including wormhole through the tunnel (called out-of-band channel-OB), wormhole using encapsulation, wormhole using packet relay, and wormhole with high power transmission. Such wormhole attacks may operate in two modes: Hidden Mode (HM) and Participation Mode (PM). ...
... These solutions thus incur high communication overhead. With time analysis based approaches such as DelPHI [2], MHA [11], and TTHCA [14,15], a malicious node may collaborate with the route discovery process but deliberately provides fake information in the control packets. With digital signature based approaches such as SAODV [19] which does not have a key management mechanism, malicious nodes can pass over the security by using fake keys. ...
... However, in dynamic environments where the network loads are unpredictable and nodes move rapidly, the RTTs are highly variable, the proposed solution becomes less reliable. The authors in [11] proposed the multi-hop count analysis (MHA) solution based on hop counts. MHA does not require Round Trip Time (RTT) measurement. ...
Wormhole attack is a serious security issue in Mobile Ad hoc Network where malicious nodes may distort the network topology and obtain valuable information. Many solutions, based on round trip time, packet traversal time, or hop-count, have been proposed to detect wormholes. However, these solutions were only partially successful in dealing with node high-speed mobility, variable tunnel lengths, and fake information by malicious nodes. To address those issues, this paper proposes a novel multi-level authentication model and protocol (MLAMAN) for detecting and preventing wormhole attacks reliably. MLAMAN allows all intermediate nodes to authenticate control packets on a hop-by-hop basis and at three levels: (1) the packet level where the integrity of the packets can be verified, (2) the node membership level where a public key holder-member can be certified, and (3) the neighborhood level where the neighborhood relationship between nodes can be determined. The novelty of the model is that it prevents malicious nodes from joining the network under false information and pretense. It detects wormhole nodes effectively under various scenarios including variable tunnel lengths and speeds of moving nodes. The effectiveness of our approach is confirmed by simulation results through various scenarios.
... The below fig.1 illustrates different routing methods. A MANET, because of its remarkable framework less trademark contrasted with different sorts of remote systems, can be exceptionally valuable for some applications in which no framework exists [21]. Thus, secure routing methods are required to give secure correspondence strength for multicast routing [6]. ...
MANET routing is complex task and selecting secured route ought to be made sooner before the node leaves the network. Quick choices dependably redress network execution. Most MANET routing conventions are intended to work in a cordial and agreeable condition which makes them powerless against different assaults. Further, nodes need to forward data packets to different nodes to empower information correspondence between the nodes that are not in the radio scope of each other. Be that as it may, a node may decline to forward data packets or halfway do the sending or even endeavor to intrude on the system tasks. This is for the most part thought to be a sort of bad conduct which demonstrates the presence of maliciousnode in a system. Trust and Reputation would fill in as a noteworthy answer for these issues. Secured data transmission is a complex task in MANET as there is a maximum chance for attackers to crash the network. Taking in the system qualities and picking right routing choices at right occasions would be a noteworthy arrangement. In this work, we have completed a broad overview of fault tolerant methods connected to routing in MANETs. Because of the proximity of attackernodes, the procedure of administration disclosure is extraordinarily influenced, which may prompt poorer execution of the network. This may prompt less packet delivery proportion, throughput, expanded control overhead;add up to overhead and packet drops. Further, anchoring administration revelation task is exceptionally troublesome since, it includesthe notoriety of the extensive number of middle of the road nodes present in the system[3]. This paper presents a survey on different techniques for routing,key management and reductions method on packer droppings.
... This mechanism is implemented based on the DSR protocol. Shang, Laih and Kuo [39], proposed a technique of hop count analysis. In this method selects routes and "avoids" rather than "identify" the wormhole resulting in low cost and overhead. ...
A Mobile ad hoc network (MANET) is self
organizing multi-hop network. In general MANET is
characterized by the open wireless medium and very open to
anyone. Due to the unique characteristics such as dynamic
network topology, limited bandwidth, limited battery power and
infrastructure less network environment, MANET is lacking in
centralized authorization and highly vulnerable to malicious
attacks. Thus the security is a critical problem when
implementing MANET. In this survey, we have investigated
different tools used by various attacks in MANET relating to fail
routing protocols and described the mechanisms used by the
secured routing protocols to counter them. The main objective
of this paper is to present an extensive survey of the known
attack detection, prevention approaches and to present new
dimensions for their classification.
... Introducing intuitive method has been proposed by Jen et al. [10] to detect and prevent the wormhole attack in MANET. This method provides a high efficiency compared with the existing methods and also has good performance with low overhead. ...
One of the major harmful attacks in wireless sensor network is wormhole attack. These attacks are disturbing the routing in networks and create a large amount of traffics. Wormhole attacks are target to the banks, government, private sectors, public sectors etc. The proposed method is used to analyse and detect the wormhole attack. Using EIGRPprotocol to identify the shortest path and detect the attacking node based on the round trip time variation technique. As compared with previous method, it is the easy way to detect the wormhole attacks.
... They also make use of a hop-count parameter to differentiate between normal and wormhole nodes. The approach proposed in [35] is fairly simple and based upon the number of hops traversed by the routing packet. In this approach, routes with a higher number of hops are considered to be fair, whereas, routes with relatively fewer hops are treated as the malicious or corrupted ones. ...
Routing layer is one of the most important layers of the network stack. In wireless ad hoc networks, it becomes more significant because nodes act as relay nodes or routers in the network. This characteristic puts them at risk of routing attacks. A wormhole is the most treacherous attack on a routing layer of wireless ad hoc networks. The present proposed techniques require extra hardware, clock synchronization; or they make restrict assumption to deal with this attack. We have proposed a simple behavior-based approach which uses a small amount of memory for recording a few packets received and sent by the neighboring nodes. From this information, a behavior of these nodes is detected, that is, whether the behavior is benign or malicious. Nodes exhibiting malicious behavior are placed in the blocked node list. Malicious nodes are broadcasted in the network. None of the legal nodes in the network entertains any packet from these nodes. This approach has been simulated and verified in ns2.30 which detects and isolates wormhole nodes successfully. The current study focuses on the looping behavior of this attack.