ArticlePDF Available

Algorithm to Detect and Recover Wormhole Attack in MANETs

Authors:
  • Government Engineering College, Rajkot

Figures

Content may be subject to copyright.
International Journal of Computer Applications (0975 8887)
Volume 124 No.14, August 2015
7
Algorithm to Detect and Recover Wormhole
Attack in MANETs
Darshana Sorathiya
PG Scholar Computer Engineering
RK University
Rajkot, Gujarat, India
Haresh Rathod
Assistant Professor Computer Engineering
RK University
Rajkot, Gujarat, India
ABSTRACT
A Mobile Ad-Hoc Network (MANET) is a network in which
the mobile nodes are randomly connected with each other.
Nodes are dynamically in nature. It usually works by
broadcasting the information. Its nature is broadcasting so
there is a chance to disrupt network by attacker. The number
of attack can be done in Mobile Ad Hoc Network. In this
paper we have studied about wormhole attack in AODV. We
have analyzed different technique to detect and prevent
wormhole attack. In our proposed solution detect and
overcome the effect of wormhole attack in MANET.
Keywords
MANET, Wormhole attack, Wormhole detection techniques
1. INTRODUCTION
MANETs is a collection of dynamic mobile nodes. It is a
structure less network in which mobile nodes are free to move
in any direction. There is no any centralized controller in
network. A communication have been established which
each other using a multi hop links. It behaves like a router.
There is no any base station. It is useful in situations where
we have lack of fixed network infrastructure, such as an
emergency situations or rescue operation, medical assistance,
disaster relief services, mine site operations, and military
mobile network in battlefields. In MANETs, identification of
malicious node is very hard because mobile node has volatile
nature.
Fig 1: Mobile Ad Hoc Network [11]
Security is providing protected communication between
mobile nodes in wireless network. Many routing protocols are
available for MANET. It has been proposed to facilitate rapid
and efficient network design and restructuring.
2. AODV ROUTING PROTOCOL
Ad hoc on-demand distance vector (AODV) is a reactive
routing protocol which is designed for ad hoc network. Route
is not predefine it established when it’s needed. AODV
routing protocol is used for both unicast routing as well as
multicast routing. AODV uses a sequence number for find
the routing message is fresh. It applies a destination sequence
numbers for finding the fresher path. AODV has three types
of controlling message RREQ, RREP, RERR.
Fig 2: RREQ Broadcast
Fig 3: RREP Forwarded Path
In an AODV, RREQ is used for the route broadcasting.
Source node uses this route request packet for broadcast the
route request. RREP is route reply which is send if node has a
valid route to the destination.
3. WORM HOLE ATTACK
Among various attacks, worm hole is very dangerous as it
does not exploit any other node in the network. Due to
wormhole attack on proactive type of protocol like AODV
first it generates the tunnel between two malicious nodes. In
this tunnel it contains data packet for a long time so in result
End to End delay is affected. In both proactive and reactive
routing protocol wormhole attack has significant impact. It
performs an operation like packet dropping while it shows in
low network throughput.
Tunnel is being generated by using out band or in band
channel. Tunnel tried to show direct path between source and
destination. This make the tunnelled packet get there either
faster or with minimum hops compared to the simple multi
hop path on which packet will be transmitted. This creates a
false impression crated by this comparison that the two end
points of the tunnel also say wormhole points are very close to
each other means that that one is a shorter route.
In the following figure s2 and s9 are two malicious end nodes
that makes wormhole tunnel to received RREQ packets.
International Journal of Computer Applications (0975 8887)
Volume 124 No.14, August 2015
8
Malicious node s9 send a packet with a fake route which is s9
to s2, which is not an actual path. Actual path is s9-s8-s6-s5-
s4-s2. Route s9 to s2 creates false impression.
Fig 4: Wormhole attack [9]
4. RELATED WORK
The various techniques used for the prevention and detection
of wormhole attack in MANET is described below:
4.1 Packet Leashes
In this paper [6], the method is used to detect wormhole
attack, Temporal Leashes and Geographical Leashes.
Temporal Leashes is used a sending and receiving
mechanism. Geographical Leashes is based on location of
nodes.
1. Temporal Leashes: All modes must need
strongly synchronized clock. It is based on off- the
-shelf hardware.
2. Geographical Leashes: There is no
requirement of clock synchronization. It requires
GPS hardware.
4.2 Directional Antennas
It is a hardware based approach [7] in which each node are
used directional antennas for communication purpose. Use
specific sectors of antennas and observe the direction of
received signal. This technique fails if an attacker
intentionally places the wormhole between the
communicating nodes.
4.2 Digital Signature
This paper [8] is presented a method which is useful to
prevent a wormhole attack in the network. In this method each
node contain digital signature of every nodes of a network.
Verify a digital signature of sender nodes by receiver node.
Using this verification it create trusted path between sender
and receiver. If malicious node present it is identify because
that node does not have true digital signature.
4.3 Neighbor Node Analysis
In this paper [10] neighbor node approach analyze the entire
neighbor node for the purpose of authentication, so that secure
transmission can be occur over the wireless network. This
method is use request and response mechanism. Node send a
request to all neighbor nodes. The node will maintain a table
which store a reply time. If reply time is not accurate there is a
harmful node in the current network. Comparison is done
between the response time of RREP message and the response
time of actual message sent. If response time of actual
message is greater than the response time of RREP +
threshold value than we can say that wormhole link is present
in the route. Comparison of this process is repeated till the
destination reached.
4.4 DelPHI Technique
Delay Per Hop Indication [9] is based on the calculation of
(delay per hop) value of disjoint paths. It is based on the fact
that, the delay a packet experiences in propagates one hop
should be comparable along each hop path. While in the
wormhole attack, delay for propagating across fake
neighbours are high as there are many hops between them. It
doesn’t need any extra hardware or tight time synchronization
and has high power efficiency [9]. It works for both In-Band
and Out of Band mode.
4.5 WHOP Technique
This paper [12] proposes WHOP technique in which a node
send extra packet which is called hound packet after the route
request is send. From source to destination there are many
routes available but the hound packet is processed by the
packet in which the packets are involved with source to
destination. WHOP contains other three column address of
node processing bit (PB) and count to reach next hop
(CRNH). CRNH represents the hop difference between
neighbors of one hop separated node. At each node CRNH
value is increment + 1 from the first.
5. PROPOSED SCHEME
We use path tracing algorithm and in our work we use two
parameters for finding wormhole link or path: 1) hop count 2)
RTT (delay). In our work, we calculate delay/hop count ratio
when RREP receive by sender. When sender broadcast RREQ
message for particular destination, each intermediate node
will increase hop count, add its own id and increase time
stamp values and further broadcast RREQ message. Initially
each node maintain routing table of particular destination with
particular hop count and delay product. Now when receiver
get back RREP message, source first compare delay/hop
count. This ratio compare with threshold value which
previously counted by source. If this ratio is too large then
simply discard RREP message.
During wormhole attack, sender broadcast RREQ message, it
receive by Attacker node M1 and M1 encapsulate this
message with payload and directly send to other Attacker M2
because it create dedicated link between M1 and M2 but here
are wormhole attack, propagation in between the wrong
neighbor the delay should be irrationally high. Hence, if we
compare the delay/hop of a simple path and the wormhole
path, we have to show that the simple path delay/hop is minor.
If we find the high different value for delay/hop count is leads
to a Wormhole Attack.
Behavior of wormhole attacker like less hop count so when it
send back RREP message, at that time sender simply don’t
consider this path as a best route instead it verify consecutive
delay and hop count. It calculates delay/hop count ratio with
previously calculated for best route. Using this technique we
can improve throughput, packet delivery ratio and end2end
delay parameters of AODV over MANET.
6. SIMULATION RESULT
6.1 Performance Matrices:
6.1.1 Throughput:
In the specified time amount of data transfer for one point of
network to another point and the rate for using transmitted
data is known as throughput.
International Journal of Computer Applications (0975 8887)
Volume 124 No.14, August 2015
9
6.1.2 Packet Delivery Ratio:
It is the ratio between total number of received packet to the
total number of packet send by source node or sender node
over a network.
6.1.3 End to End delay:
A data will requires some time to transmit the data from
source to destination node; it is called End-to-end delay.
6.2 Simulation Parameters:
Table 1 : Simulation Parameter
Parameter
Value
Network Simulator
NS2.35
Simulation Time
100 s
No of Mobile Nodes
25,50,75,100
No of Wormhole
1 to 4
Topology
500 m x 500 m
Routing Protocol
AODV
Traffic
CBR
Packet Size
512 Bytes/Packet
Pause Time(t)
2.0 s
Maximum Speed(M)
4.0 m/s
Mobility Model
Random Way Point
MAC Protocol
802.11
6.3 Impact of Number of Node:
6.3.1 Graph for Throughput vs. No of Node:
Fig 5: Throughput vs. No of Node
The graph describe that the effect of the no. of nodes on
throughput. The first observation is that AODV protocol has a
high throughput because of it takes attack free path for packet
delivery. The second observation is AODV (with wormhole
attack) protocol suffers from attacking behavior and down the
throughput. The third observation is that proposed AODV
gives improved performance compared to the wormhole
attack. The reason for the improvement is that our proposed
solution strongly prevents malicious node.
6.3.2 Graph for Packet Delivery Fraction:
Fig 6: Packet Delivery Fraction
The graph describe that the effect of the no. of nodes on PDF.
The first observation is that AODV protocol has a higher PDF
compared to remaining both. The second observation is that
AODV (with wormhole attack) having very less PDF because
it shows its attacking behavior and decrease the performance
of PDF. Third observation is that the PDF is higher in our
proposed scheme as compared to wormhole attack even
though the number of nodes is increasing.
6.3.3 Graph for End to End Delay:
Fig 7: End to End Delay
The graph describe that the effect of the no. of nodes on end-
to-end delay. The first observation is that AODV protocol has
a less delay compared to AODV (with wormhole attack)
protocol because it takes safe n attack free route. The second
observation is AODV with worm hole attack has maximum
International Journal of Computer Applications (0975 8887)
Volume 124 No.14, August 2015
10
delay compared to the reaming both. The third observation is
that our proposed scheme give minimum delay compared to
simple AODV protocol because it detect attacker node and
eliminate it from the network.
6.4 Impact of number of Malicious Node:
6.4.1 Graph for throughput vs. Number of
Malicious Node:
Fig 8: Throughput vs. Malicious nodes
The graph describe that the effect of the malicious nodes on
throughput. In AODV (with wormhole attack) protocol and
our proposed scheme when no of malicious node increases,
throughput is decreases accordingly but compared to AODV
(with wormhole attack) protocol throughput increases in our
proposed work
6.4.2 Graph for PDF vs. Number of Malicious
Node:
Fig 9: Packet Delivery Fraction vs. Malicious nodes
The graph describe that the effect of the malicious nodes on
Packet Delivery fraction. In AODV (with wormhole attack)
protocol and our proposed scheme when no of malicious node
increases, packet delivery fraction is decreases accordingly
but compared to AODV (with wormhole attack) protocol
Packet Delivery Fraction increases in our proposed work.
6.4.3 Graph for Delay vs. Number of Malicious
Node:
Fig 10: Delay vs. Malicious node
The graph describe that the effect of the malicious nodes on
delay. In AODV (with wormhole attack) protocol and our
proposed scheme when no of malicious node increases, End to
end Delay is not always increase but compared to AODV
(with wormhole attack) protocol End to End Delay decreases
in our proposed work.
7. CONCLUSIONS
MANET is a wide area in which security is major challenge.
Due to absence of centralize controller the network suffers
from many security attack.In this paper, we have analysed the
different types of attacks and protocols which degrade the
performance of the network. Also different techniques are
compared to detect and prevent wormhole attack. We have in
our proposed work Source first compares delay/hop count.
This ratio compare with threshold value which previously
counted by source. If this ratio is too large then simply discard
RREP message. By using our proposed work parameters like
End-to-End delay, Throughput and Packet Delivery Fraction
gives us a better performance with compare to AODV with
attack. In future we can compare other parameter with and
without attack.
8. ACKNOWLEDGMENT
I would like to thank everyone who helped me in my research
work. I would like to thank my supervisor Prof. Haresh
Rathod I am very happy that you gave me the opportunity to
continue my research during last two years.
9. REFERENCES
[1] Robinpreet Kaur and Mritunjay Kumar Rai , “A Novel
Review on Routing Protocols in MANETs” ,
Undergraduate Academic Research Journal (UARJ),
Volume-1, Issue-1, 2012.
[2] PRADIP M. JAWANDHIYA and MANGESH M.
GHONGE, “A Survey of Mobile Ad Hoc Network
Attacks”, International Journal of Engineering Science
and Technology, Vol. 2(9), pp.- 4063-4071, 2010.
[3] M.H. davda, s.r.javid “A review paper on the study of
attacks in MANET with its detection and mitigation
scheams ” IJARCSMS, april 2014.
International Journal of Computer Applications (0975 8887)
Volume 124 No.14, August 2015
11
[4] C. Siva Ram Murthy and B.S.Manoj, “Ad hoc Wireless
Networks” (Chapter 7), 2014.
[5] E.M.Royer and C.E.Perkins, “Adhoc On-Demand
Distance Vector Routing”, IEEE, pp. 90-100, February
1999.
[6] Yih-Chun Hu, Adrian Perrig, David B. Johnson, “Packet
Leashes: A Defence against Wormhole Attacks in
Wireless Ad Hoc Networks”, IEEE 2003.
[7] L. Hu and D. Evans, “Using directional antennas to
prevent wormhole attacks”. In the Proceedings of
network & distributed system Security Symposium,,
February 2004.
[8] Pallavi Sharma, Prof. Aditya Trivedi, "An Approach to
Defend Against Wormhole Attack in Ad Hoc Network
Using Digital Signature”, IEEE, 2011.
[9] Lui K.-S., sChiu H.S., “DelPHI: Wormhole Detection
mechanism for Adhoc Wireless Networks” Proceedings
of the 1st International Symposium on Wireless
Pervasive Computing; Phuket, Thailand. 1618 January
2006.
[10] Sweety goyai, harish rohil, “Securing MANET against
Wormhole Attacl using Neighbour Node Analysis” IJCA
volume 81,November 2013
[11] Saleh Ali K.Al-Omari1, Putra Sumari2 “An overview of
a mobile ad hoc networks for the existing protocols and
application”, International journal of graph theory in
wireless Adhoc network, March-2012.
[12] Saurabh Gupta, Subrat Kar, S Dharmaraja, “WHOP:
Wormhole Attack Detection Protocol using Hound
Packet”, IEEE, 2011.
IJCATM : www.ijcaonline.org
... Pareek and Sharm recommend the use of MAC addresses to counter the Sybil attacks [26]. Sathya and Rathod are of the view an algorithm can not only detect the wormhole attacks in mobile ad-hoc networks but also it can recover wormhole attacks [27]. I of ad-hoc networks. ...
Article
Ad-hoc networks (A-h-N) are wireless networks of individuals for usually a short period of time. The use of mobile phones, laptops, and computers combined with network services has fuelled the use of A-h-N in the 21st century. In this global world, the demand for cost-effective and technically efficient Ad-hoc networks is rising rapidly. The review of literature clarifies how various factors largely affect the ad-hoc network's performance. Keeping in view the significance of Ad-hoc network performance, I have given a deep analysis of improving its performance in this study. The factors affecting the ad-hoc network's performance are challenging for technical experts, network companies, and individual users. My paper is of significance to all the stakeholders. The model approach is a precondition to improving the performance of an A-h-N. The use of malicious node detectors' ineffective devices is bound to disallow harmful nodes. The increase in signal strength is a factor preventing link failures. It is equally important to ensure minimum packet losses in an ad-hoc network. Hence, improving the performance of an ad-hoc network is the core idea of this study indeed.
... Two collaborative techniques for intrusion detection in MANET is introduced they are 1 initial detection is designed for detection of malicious nodes on neighbourhood of nodes in which each pair of nodes are within radio range of each other 2 this detection method is also designed for detection of malicious nodes in neighbourhood nodes, but here each pair of nodes may not be in the radio range i.e. there is a node among them which all nodes are in one-hop vicinity. Sorathiya and Rathod (2015) suggested an algorithm for detecting and recovering wormhole attack in MANET. Here they use path tracing algorithm which uses two specific parameters such as hop count and RTT (delay). ...
Article
Full-text available
Vehicular ad-hoc network (VANET) is a promising approach that provides safety measures and other application to the drivers on the vehicles. The focus of VANETs is to fulfil user’s requirements on road side area which increases the safe and comfortable journey for users. It provides good communication like mobile ad-hoc network (MANET) when there is no intruders exist in the network. In VANET, communication depends on road safety such as emergency situation, vehicles tracking, messages monitoring and tracking of vehicles. But many attackers like black hole attack, wormhole attack and Sybil attack are more vulnerable to VANET. In order to provide efficient communication, we provide a Malicious node identification routing mechanism which gives the valid route between two vehicles. To avoid several attacks, we introduce a protection mechanism that includes key management for preventing our network. Our proposed system provides efficient communication on VANET that focus on throughput, end-to-end delay, packet delivery ratio, detection rate and misdetection rate.
Chapter
Due to the rapid growth of using technologies, a new paradigm named the Internet of Things (IoT) occurs. In the IoT, different devices communicate and share data. MANET is an example of IoT where devices communicate together. A Mobile ad hoc Network (MANET) is an easy set up network that consists of a group of nodes. However, MANET with its nature as dynamic topology becomes vulnerable to attacks. A Denial of Service attack (DoS) occurs in MANET and aims to prevent legitimate users from access to their legitimate services. Thus, the network performance will be deteriorated. The dynamic topology in MANET enables nodes to join or leave the network frequently. Thus, the chance of MANETs merge happens. In this article, the Merging using (Monitoring; Detection, and Rehabilitation) MrDR (MUMrDR) is used to detect DoS attacks based on decentralised trust concept. The Network Simulator (NS2) is used to simulate the experiment.
Conference Paper
A Mobile ad hoc Network (MANET) is a selfconfigure, dynamic, and non-fixed infrastructure that consists of many nodes. These nodes communicate with each other without an administrative point. However, due to its nature MANET becomes prone to many attacks such as DoS attacks. DoS attack is a severe as it prevents legitimate users from accessing to their authorised services. Monitoring, Detection, and rehabilitation (MrDR) method is proposed to detect DoS attacks. MrDR method is based on calculating different trust values as nodes can be trusted or not. In this paper, we evaluate the MrDR method which detect DoS attacks in MANET and compare it with existing method Trust Enhanced Anonymous on-demand routing Protocol (TEAP) which is also based on trust concept. We consider two factors to compare the performance of the proposed method to TEAP method: packet delivery ratio and network overhead. The results confirm that the MrDR method performs better in network performance compared to TEAP method.
Article
Full-text available
In mobile ad-hoc network (MANET) security is a challenging issue due to its open nature, infrastructure less property and mobility of nodes. In designing a new security mechanism for mobile ad hoc networks, one must consider the attacks variations as well as the characteristics of the attacks that could be launched against the ad hoc networks and existing detection and mitigation schemes.. The discussions of these four aspects are summarized in this paper. This paper also classifies several common attacks against the ad hoc networks routing protocols based upon the techniques that could be used by attackers to exploit routing messages.
Article
Full-text available
In Mobile Adhoc NETworks (MANETs), security is of major concern because of its inherent liabilities. The characteristics of MANETs like infrastructure less network with dynamic topology pose a number of challenges to security design. There is an increasing threat of attacks in MANET. Wormhole attack is one of the security attacks on mobile adhoc networks in which a pair of colluding nodes make a tunnel using a high speed network. This paper focuses on providing a solution for secure transmission through the network and proposes a neighbor node analysis approach to identify wormhole attack and removes wormhole link in MANET. The proposed work is simulated using NS-2 and is analyzed using certain parameters such as throughput, loss rate, delay rate.
Conference Paper
Full-text available
The lack of centralised infrastructure in ad hoc network makes it vulnerable to various attacks. MANET routing disrupts if participating node do not perform its intended function and start performing malicious activity. A specific attack called Wormmhole attack enables an attacker to record packets at one location in the network, tunnels them to another location, and retransmits them into the network. In this paper, we present a protocol for detecting wormhole attacks without use of any special harware such as directional antenna and precise synchronised clock and the protocol is also independent of physical medium of wireless network. After the route discovery, source node initiates wormhole detection process in the established path which counts hop difference between the neighbours of the one hop away nodes in the route. The destination node detects the wormhole if the hop difference between neighbours of the nodes exceeds the acceptable level. Our simulation results shows that the WHOP is quite excellent in detecting wormhole of large tunnel lengths.
Conference Paper
Full-text available
An ad-hoc network is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. We present Ad-hoc On Demand Distance Vector Routing (AODV), a novel algorithm for the operation of such ad-hoc networks. Each mobile host operates as a specialized router, and routes are obtained as needed (i.e., on-demand) with little or no reliance on periodic advertisements. Our new routing algorithm is quite suitable for a dynamic self starting network, as required by users wishing to utilize ad-hoc networks. AODV provides loop-free routes even while repairing broken links. Because the protocol does not require global periodic routing advertisements, the demand on the overall bandwidth available to the mobile nodes is substantially less than in those protocols that do necessitate such advertisements. Nevertheless we can still maintain most of the advantages of basic distance vector routing mechanisms. We show that our algorithm scales to large populations of mobile nodes wishing to form ad-hoc networks. We also include an evaluation methodology and simulation results to verify the operation of our algorithm
Article
Full-text available
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.
Article
Full-text available
Security is an essential requirement in mobile ad hoc network (MANETs). Compared to wired networks, MANETs are more vulnerable to security attacks due to the lack of a trusted centralized authority and limited resources. Attacks on ad hoc networks can be classified as passive and active attacks, depending on whether the normal operation of the network is disrupted or not. In this paper, we are describing the all prominent attacks described in literature in a consistent manner to provide a concise comparison on attack types. To the best of our knowledge, this is the first paper that studies all the existing attacks on MANETs.
Article
Mobile means moving and ad hoc means temporary without any fixed infrastructure so mobile ad hoc networks are a kind of temporary networks in which nodes are moving without any fixed infrastructure or centralized administration. MANETs are generating lots of interest due to their dynamic topology and decentralized administration. Due to the diverse applications which use MANETs for wireless roaming it is a current research issue. There are different aspects which are taken for research like routing, synchronization, power consumption, bandwidth considerations etc. This paper concentrates on routing techniques which is the most challenging issue due to the dynamic topology of ad hoc networks. There are different strategies proposed for efficient routing which claimed to provide improved performance. There are different routing protocols proposed for MANETs which makes it quite difficult to determine which protocol is suitable for different network conditions as proposed by their Quality of service offerings. This paper provides an overview of different routing protocols proposed in literature and also provides a comparison between them.
Conference Paper
A Mobile Ad hoc Network (MANET) is an autonomous collection of mobile nodes forming a dynamic network and communicating over wireless links. Owing to its uniqueness such as easy deployment and self-organizing ability, it has shown great potential in many civil and military applications. As MANETs are gaining popularity, their need to support real time and multimedia applications is rising as well. Such applications have Quality of Service (QoS) requirements like bandwidth, end-to-end delay, jitter and energy. Consequently, it becomes very necessary for MANETs to have an efficient routing and QoS mechanism to support these applications. A number of QoS routing protocols with distinguishing features have been proposed recently. This paper presents a thorough overview of some of the QoS routing protocols along with their strengths and weaknesses. A comparative study of the QoS routing protocols is done and in addition, the current issues and future challenges that are involved in this exciting area of research are also included.
Article
Ad hoc networks are vulnerable due to their structure less property. A Mobile Ad-Hoc Network (MANET) is an infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources. They also have capability of network partition. The Wormhole attack is the most attention seeking attack in ad hoc networks; it consists of two malicious nodes and a tunnel between malicious nodes. I n wormhole attack, attacker records the packets at one location and tunnels them in another location in same network or in different network. In this paper, we present a mechanism which is helpful in prevention of wormhole attack in ad hoc network is verification of digital signatures of sending nodes by receiving node because each legitimate node in the network contains the digital signature of every other legitimate nodes of same network. In proposed solution, if sender wants to send the data to destination, firstly it creates a secure path between sender and receiver with the help of verification of digital signature. If there is presence of any malicious node in between the path then it is identified because malicious node does not have its own legal digital signature.
Conference Paper
Wormhole attacks enable an attacker with limited resources and no cryptographic material to wreak havoc on wireless networks. To date, no general defenses against wormhole attacks have been proposed. This paper presents an analysis of wormhole attacks and proposes a countermeasure using directional antennas. We present a cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors. Our defense greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.