Fig 1 - uploaded by Farrukh Aslam Khan
Content may be subject to copyright.
Working of Wormhole Attack in MANETs.

Working of Wormhole Attack in MANETs.

Source publication
Article
Full-text available
Mobile Ad hoc Networks (MANETs) work without any fixed infrastructure and each node in the network behaves as a router in order to transmit data towards the destination. Due to the lack of central point of control, MANETs are more vulnerable to routing attacks as compared to other networks. Wormhole attack is one of the most severe routing attacks,...

Context in source publication

Context 1
... two or more malicious nodes launch a wormhole attack using a private channel called tunnel, between them. The working of wormhole attack is shown in Figure 1. At one end of the tunnel, a malicious node captures a control packet and sends it to another colluding node at the other end through a private channel, which rebroadcasts the packet locally. ...

Similar publications

Conference Paper
Full-text available
MANET (Mobile Ad-hoc Network) is simply a set of mobile hosts connected wirelessly without any centralized management, where each node acts as a packet sender, packet receiver, and a router at the same time. According to the nature of this network, the dynamic topology and the absence of a centralized management cause several security issues and at...

Citations

... This attack involves conversation spoofing or accidental data collection. It disrupts transmission by listening in and inserting falsified messages into the network.[38] This attack steals sensitive data, such as private and public keys. ...
Article
Full-text available
Security is an essential part of any network, wired or wireless. Attackers can combine active and passive methods to penetrate otherwise undetectable routing in message and data packets, making any connection between mobile nodes in an unfamiliar environment extremely vulnerable. In this piece, we focus on the most pressing security threats facing mobile ad hoc networks. Due of its lack of protection against malicious actors, MANET can be accessed by anyone. A major MANET objective is the development of a fool proof security system capable of protecting the network against a wide range of routing assaults, even in the presence of malicious nodes. However, these approaches are flawed due to the limited resources of MANETs, such as battery life and network bandwidth. A mobile ad hoc network can operate in isolation from or in tandem with a traditional wired network. The adaptability and self-organization of MANETs are both their greatest strength and their greatest security vulnerability. This book discusses both active and passive routing attacks, such as black holes, spoofing, wormholes, and floods. Passive assaults are also discussed, such as traffic monitoring, traffic analysis, and eavesdropping.
... Thus, regardless of the wormhole attack type, the malicious nodes create a tunnel between two locations and make the path between them appear more efficient than other routes, enabling the node to collect more packets [35]. Therefore, in this study, we did not consider the common assumption that such a tunnel has a poorer communication quality than that of a normal route [36]. In wormhole attacks, malicious nodes need to maintain high communication quality in the tunnels they create. ...
Article
Full-text available
The proliferation of wireless mobile devices has resulted in mobile ad hoc network (MANET) technologies, which enable the formation of networks without infrastructure assistance, gaining increased attention. The advancements in these technologies have also resulted in the variety of attacks targeting them becoming more diversified. Particularly, owing to their inability to ensure node reliability, MANETs are vulnerable to routing attacks such as wormhole attacks. Since wormhole attacks often do not directly damage networks, detecting them can be challenging. In response, we propose a novel multiple verification-based wormhole attack detection method that leverages the characteristics of such attacks. The proposed method measures the credit of each node based on a trust system. The trust levels of suspicious nodes are reduced during routing; those with trust levels below a certain threshold are considered malicious. This trust system was implemented using reinforcement learning, which improves the accuracy of the system over time. Simulation experiments in which the proposed method was applied to existing routing methods in a densely populated environment were conducted; the rate of traffic passing through paths with malicious nodes was significantly reduced.
... Nowadays, the use of MANETs is highly appealing and widespread in a lot of applications such as space communication, disaster relief, mission-critical battlefield communication, road or accident guidance, trade fairs, sports stadiums, shopping malls, and avoiding vehicle crashes [8]. However, MANET properties make the network's environment vulnerable to various types of attacks, including wormholes, black holes, Grey Holes, Rushing, and flood-based attacks [2][3][4][9][10][11]. Many techniques and methods have been developed to deal with these attacks. ...
... MANET represents an independent system of porTable nodes to form a self-organizing, infrastructure-less, and quickly deployable wireless network [8,11,19]. MANET is a promising technology that can provide important facilities for up-to-date transportation systems [1]. Due to its inherent nature, MANET is strongly vulnerable to miscellaneous security attacks [13,17,20]. ...
Article
Full-text available
This paper addresses the security concerns associated with Mobile Ad-hoc Networks (MANET) and proposes a new method for detecting and preventing attacks using machine learning. The study involved the creation of a MANET with 26 nodes in NetSim (Network Simulator) software, followed by the implementation of wormhole and blackhole attacks. A dataset was generated from the network traffic obtained during the simulations, and a machine-learning model was designed to predict and detect these attacks. The model achieved high sensitivity, accuracy and f1 scores of 99%. The effectiveness of the model was tested by developing a real-time application. This method can be applied to any wireless network and is particularly relevant for companies that use Ad-hoc networks for communication.
... Therefore, the IDS should be light-weight and consume low processing power with smarter attack detection. 2. Privacy and security of data being traversed on the IoT networks is another major concern in IoT networks, therefore any ( Imran et al., 2015 ). ...
Article
The growth of the internet over the years has resulted in massive use and spread of the Internet of Things (IoT) in many areas. From home networks to industrial IoT, from medicine to transportation, IoT is everywhere. This massive usage has come with a price as attackers make use of sophisticated techniques and malware to target these heterogeneous IoT networks. Moreover, the low processing power and minimal resources of the IoT devices make security and privacy a major challenge. This weakness has motivated attackers to target IoT networks in a wide variety of ways by launching different types of attacks. One such kind of attack is the Wormhole attack which belongs to the family of routing attacks and disturbs the normal routing and flow of network packets in the IoT network. Many techniques involving rule-based, trust-based, machine learning-driven and deep learning assisted have been devised to counter wormhole attacks. The proposed research work presents a cascaded wormhole detection technique for IoT networks which is based on the federated deep learning technique and a Dynamic Trust Factor (DTF). The DTF is based on two trust attributes, whereas Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) deep learning models have been trained using the federated approach, which guarantees data security and privacy at the node level. The proposed technique achieves the accuracy of 96% and is lightweight due to the cascaded and federated learning approach.
... In these techniques, congestion gets introduced due to extra data packets and neighborhood techniques. Imran et al. [121] listed features for detection of WHA as depicted in Figure 10. ...
Article
Full-text available
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jellyfish attack, wormhole attack (WHA), byzantine attack, selfishness attack, and network partition attack. Out of these, worm hole attack is the most common and severe attack that substantially undermines the performance of the network and disrupts the most routing protocols. In the past two decades, numerous researchers have explored the number of techniques to detect and mitigate the effect of WHAs to ensure the safe operation of wireless networks. Hence, in this article, we mainly focus on the WHAs and present the different state of art methods, which have been employed in previous years to discern WHA in wireless networks. The existing WHA detection techniques are lacking due to usage of additional hardware, higher delay, and consumption of higher energy. Round trip time (RTT) based detection methods are showing better results as they do not require additional hardware. Machine learning (ML) techniques can also be applied to ad-hoc network for anomaly detection and has a great influence in future; therefore, ML techniques are also analyzed for WHA detection in this article. SVM technique is mostly used by the researchers for outstanding results. It has been analyzed that hybrid approach which uses the traditional detection technique and ML technique are showing better results for WHA detection. Finally, we have identified the areas where further research can be focused so that we can apply the WHA detection methods for larger topolog-ical area for more flexibility and accurate results.
... Due to restricted memory, connectivity capacity, and low power consumption, complicated and refined algorithms are difficult to be incorporated in IoT devices [33]. e gateway can also be targeted by congestion, DoS, and routing attacks. ...
Article
Full-text available
In Mobile Ad hoc Network (MANET) enabled Internet of Things (IoT) agricultural field monitoring, sensor devices are automatically connected and form an independent network that serves as a cloud for many services such as monitoring, securing, and properly maintaining. Cloud-based services in MANET models can prove to be an extremely effective way of smart agricultural functionalities for device-to-device information exchange. Security is a serious issue with Cloud-MANET-based IoT since nodes are scattered, mobile, and lacking centralized administrator, which makes it possible for data tampering and illegal actions on cloud servers. Therefore, these types of networks are more vulnerable to Denial of Service (DoS) attacks such as Blackhole and Wormhole. The MANET Enabled IoT-Agricultural Field Monitoring environment is deployed through a case study. The effect of Blackhole and Wormhole attacks is analyzed using the Ad hoc On-demand Distance Vector (AODV) routing protocol with the help of Network Simulator 3 (NS-3) in order to determine which has the most impact on network performance. We computed performance constraints such as throughput, packet delivery ratio (PDR), end-to-end delay (EED), and Jitter-Sum of preprocessed data gathered with the flow-monitor module of NS-3. The effect of attacks on MANET Enabled IoT-Agricultural Field Monitoring is compared on the varying number of nodes participating in the Cloud-MANET-based IoT network. The throughput and goodput capability of every node is computed through the trace metric package. This method is also highly useful for future Cloud-MANET-Based IoT smart agricultural field security research.
... For communication, the nodes use multi-hop strategy to communicate with the nodes which are not in their transmission range and nodes have to act both as router and host. MANET is highly demanding, because it is flexible, cost effective, and robust and connection establishment in less time [1]. On the other hand, these characteristics of MANET make it vulnerable to launch a different kind of attack and the Wormhole attack is assumed to be the most dangerous attack. ...
Article
Full-text available
The Wireless Ad-hoc network or Mobile Ad-Hoc network is multi-hop network and rely on dynamic infrastructure where nodes are generally mobile and require signal as a communication component. Mobile Ad-Hoc Network (MANET) is growing more popular due to its advantages of being adaptable, quick to set up, cost-effective, and durable. On the other hand, it has limitations like limited wireless range, frequently changing routes, packet drop, heterogeneous devices, and limited battery power. Hence, MANET is vulnerable to various types of security attacks unlike the infrastructure-based wired network. One of the most dangerous attack is wormhole attack which causes major impact on routing. In view of the necessity to provide secure routing, identification of malicious node is not enough, isolation of malicious node is necessary without considerable overheads in MANETs. This research work presents Node to Node (N2N) Trust based mechanism for secure routing in MANETs based on Node-to-Node packet delay. It uses aggregated N2N trust to detect source malicious node of wormhole and isolate the malicious node to ensure that the malicious node does not intercept the routing. Thus, the mechanism offers routing of data traffic securely with improved throughput. In this work, we have employed NS3 (Network Simulator-3) simulator for experimental analysis and (Dynamic Source Routing) DSR protocol as reference for implementation of N2N Trust based algorithm.
... Wormhole attacks create a sufficiently robust tunnel and a number of the distant routers and alter the routing protocol conduct and transmit the visitors via the tunnel [6]. This state of affairs makes the sufferers pick out the shortest path, and the long way apart routers observed close to the neighbor. ...
Article
Full-text available
Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datagram that enters the attacked region will end result in transmission failure with low flow network rate and excessive one-way delay. To come across and heal the attack, a self-adaptive framework is brought into the networks and the procedure of data transmission is enriched. In this work, the affected region is measured and rectified with the aid of using the proposed self-adaptive framework for Ad Hoc On-Demand Distance Vector (AODV) routing protocol network communication protocol. The overall performance of the network healing technique is investigated with the aid of using simulation and its miles diagnosed that the proposed framework suggests promising overall performance with the aid of using accomplishing excessive flow network rate and minimum delay.
... Security is considered to be the most important issue in WSNs as sensor nodes can be easily captured by the attacker nodes without suitable security, and their information can be robbed consequently [6]. Before WSNs are successfully decorated, security issues should be taken into account. ...
... In MANET, two different kinds of attacks are there which can cause the causality in the network setup i.e. external and internal attacks [19] [30] [38] [41]. ...
Article
Full-text available
The moveable ad hoc networks are untrustworthy and inclined to any intrusion due to their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are designed. The wormhole attack is considered to be the hazardous one among several attacks. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system observes the wormhole intrusions in the absence of intermediary sensor nodes towards the target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops remain amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered by these attacker nodes in the environment. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better results in comparison with existing approaches.