ArticlePublisher preview available

Proactive Prevention Key Solution for Wormhole Attack in IEEE 802.11 Networks Using AODV

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

Over the last few years there has been explosive growth in the use of the Wireless communications from top to bottom i.e. Satellite transmission to home Wireless personal area networks. The primary advantage of a wireless network is the ability of wireless node to communicate with the universe during mobility. Two basic system models of a wireless system are fixed and Mobile Adhoc Network has been developed for the wireless network paradigm. The first model consists of multiple numbers of mobile workstations and relatively fewer but more powerful, having fixed routers. The second model has been proposed to set up a network on-demand basis. When a collection of wireless mobile nodes are capable of communicating with each other without the use of network infrastructure, centralized administration, or centralized control like mobile switching centers or base stations, that set up is called Mobile Adhoc Network. Here each mobile node operates not only as a host but also as a router, forwards packets to other mobile nodes in the network that may not be within direct wireless transmission range of each other. Each node participates in an Adhoc routing protocol (Yadav et al. in Comput Netw 118:15–23, 2017) that allows it to discover multiple paths through the network to any other node. Institute of Electrical and Electronics Engineers 802.11 (IEEE 802.11) [Kaur et al. in Int J Res Advent Technol 5(8), 2017] is a vital part of pervasive networks, which is a special kind of network where users can join and communicate anytime or anywhere on the fly. It is a popular kind of network because its applications cover a variety of areas. A unique communication paradigm is used which is able to run without fixed infrastructure and relies on wireless terminals for routing and transporting services. A number of security and scalability issues arise due to its wireless transmissions and unpredictable topology changes. Open standard, dynamic topology, scattered arrangements, and multi-hop routing are crucial features of IEEE 802.11 networks that make them vulnerable to various kinds of attacks. A Wormhole attack is one of the serious kinds of attack. Thus, security is the most important concern in IEEE 802.11 networks. This paper presents the refurbishment of the routing structure of Ad hoc On-Demand Distance Vectors (AODV) protocol (Ning et al. in Proceedings of the IEEE systems, man and cybernetics society information assurance workshop (IAW), West Point, New York, USA, pp 60–67, 2003). It will be helpful to safeguard IEEE 802.11 networks from Wormhole attacks by preventing Wormhole Attacks. The DAPS technique had been presented in Saini et al. (Int J Res Advent Technol 6(4), 2018) to detect Wormhole Attacks. Further to DAPS technique, a new Wormhole prevention technique has been introduced in this paper called Proactive Prevention Key Solution (PPKS).
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
Wireless Personal Communications (2023) 128:89–108
https://doi.org/10.1007/s11277-022-09942-1
1 3
Proactive Prevention Key Solution forWormhole Attack
inIEEE 802.11 Networks Using AODV
ParminderKaurSaini1 · AmanpreetSingh2,4· J.S.Sohal3
Accepted: 28 August 2022 / Published online: 3 October 2022
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2022
Abstract
Over the last few years there has been explosive growth in the use of the Wireless commu-
nications from top to bottom i.e. Satellite transmission to home Wireless personal area net-
works. The primary advantage of a wireless network is the ability of wireless node to com-
municate with the universe during mobility. Two basic system models of a wireless system
are fixed and Mobile Adhoc Network has been developed for the wireless network para-
digm. The first model consists of multiple numbers of mobile workstations and relatively
fewer but more powerful, having fixed routers. The second model has been proposed to set
up a network on-demand basis. When a collection of wireless mobile nodes are capable
of communicating with each other without the use of network infrastructure, centralized
administration, or centralized control like mobile switching centers or base stations, that
set up is called Mobile Adhoc Network. Here each mobile node operates not only as a host
but also as a router, forwards packets to other mobile nodes in the network that may not be
within direct wireless transmission range of each other. Each node participates in an Adhoc
routing protocol (Yadav etal. in Comput Netw 118:15–23, 2017) that allows it to discover
multiple paths through the network to any other node. Institute of Electrical and Electron-
ics Engineers 802.11 (IEEE 802.11) [Kaur etal. in Int J Res Advent Technol 5(8), 2017] is
a vital part of pervasive networks, which is a special kind of network where users can join
and communicate anytime or anywhere on the fly. It is a popular kind of network because
its applications cover a variety of areas. A unique communication paradigm is used which
is able to run without fixed infrastructure and relies on wireless terminals for routing and
transporting services. A number of security and scalability issues arise due to its wire-
less transmissions and unpredictable topology changes. Open standard, dynamic topol-
ogy, scattered arrangements, and multi-hop routing are crucial features of IEEE 802.11
networks that make them vulnerable to various kinds of attacks. A Wormhole attack is
one of the serious kinds of attack. Thus, security is the most important concern in IEEE
802.11 networks. This paper presents the refurbishment of the routing structure of Ad hoc
On-Demand Distance Vectors (AODV) protocol (Ning etal. in Proceedings of the IEEE
systems, man and cybernetics society information assurance workshop (IAW), West Point,
New York, USA, pp 60–67, 2003). It will be helpful to safeguard IEEE 802.11 networks
from Wormhole attacks by preventing Wormhole Attacks. The DAPS technique had been
presented in Saini etal. (Int J Res Advent Technol 6(4), 2018) to detect Wormhole Attacks.
Extended author information available on the last page of the article
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
... Authors [23] presented a review of various ML-AI techniques for detecting wormholes in wireless sensor networks that can produce a state-of-the-art solution to the existing problem. Authors [24] presented a routing technique using the AODV protocol that prevented the wormhole attack and provided security for IEEE 802.11 networks. Along with the DAPS technique, the authors also presented the Proactive Prevention Key Solution (PPKS) algorithm, which uses the timestamp of the nodes to determine its validity. ...
... A wormhole is one of the most popular and severe VANET attacks. The wormhole, like the Gray Hole attack, is a variant of the Black Hole attack [24][6] [8]. In this attack, two or more attacker vehicles create a tunnel and send packets from one end of the attacker vehicle to the other end of the attacker vehicle, then send them to the network [7]. ...
... Attack Simulation: By inserting data packets between two malicious vehicles that have a high-speed data transfer tunnel, it is possible to simulate wormhole attack scenarios. This creates an artificial wormhole [24]. Training TD3: Using the legitimately collected data and the data from simulated wormhole attacks, the TD3 algorithm is trained. ...
Article
Full-text available
Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.
Research
Full-text available
Mobile Ad hoc network (MANET) is a special kind of network where users can join and can communicate anytime, anywhere on the fly. It is an infrastructure free wireless network. Due to its wireless transmissions a number of security and scalability issues affect MANET. Despite the fact that open standard, dynamic topology, scattered arrangements and multi-hop routing are the best features of Adhoc Network but if you look in to the security part, then the same features become a biggest threat to the security of MANETs. Due to these features, this type of network is susceptible to various attacks. Wormhole is one of the serious kinds of attack in the Ad hoc Network. Since IEEE 802.11 type of network is quite vulnerable to various types of attacks security becomes the most important issue. This paper presents review of Wormhole attacks for IEEE 802.11 networks.
Experiment Findings
Full-text available
IEEE 802.11 [1] is a popular kind of network because its applications cover variety of areas. It is able to run without infrastructure. A number of issues arise due to its unpredictable topology changes [2]. Congestion, Routing and Security are the problems commonly faced in this type of network. Open standard and scattered arrangements are crucial features of IEEE 802.11 network which make it vulnerable to various kinds of attacks [3]. This paper proposes a new detection technique for Wormhole attacks. It is implemented by modifying routing structure of Ad hoc On-demand Distance Vector (AODV) routing protocol [4]. The proposed work is simulated using Network Simulator.
Article
Full-text available
Over the first few years, a wireless sensor network has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. Wormhole attack is one of the severe attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and focuses on some different technique to detecting wormhole attacks in wireless sensor networks.
Article
Full-text available
Selection of an optimal path is a challenging issue in Mobile Ad-hoc network (MANET). This paper proposes a new mechanism for route selection combining Ad-hoc On-Demand Distance Vector (AODV) protocol with Ant Colony Optimization (ACO) to improve Quality of Service (QoS) in MANET. Based on the mechanism of ant colony with AODV, the finest route for data delivery is selected using pheromone value of the path. In the proposed work, pheromone value of a route is calculated based on end to end reliability of the path, congestion, number of hops and residual energy of the nodes along the path. The path which has highest pheromone value will be selected for transmission of the data packet. The simulation result shows that the proposed scheme outperforms AODV, Dynamic Source Routing (DSR) and Enhanced-Ant-DSR routing algorithms.
Article
Full-text available
This paper presents a formal specification of the Ad hoc On-Demand Distance Vector (AODV) routing protocol using AWN (Algebra for Wireless Networks), a recent process algebra which has been tailored for the modelling of Mobile Ad Hoc Networks and Wireless Mesh Network protocols. Our formalisation models the exact details of the core functionality of AODV, such as route discovery, route maintenance and error handling. We demonstrate how AWN can be used to reason about critical protocol properties by providing detailed proofs of loop freedom and route correctness.
Article
Mobile Ad-hoc Network (MANET) is a temporarily wireless network constructed by a set of mobile devices which are communicated over wireless channel without having any fixed infrastructure and centralized administration. Multicasting is a mechanism to send a data packet from one node to a group of receivers node at a time. There are various challenges in a MANET due to dynamic network topology and limited resources. Since the network performance metrics such as delay, bandwidth and energy changes very frequently due to node mobility i.e. these network metrics have the uncertainty issues in a wireless mobile ad-hoc network. The impact of these uncertainty issues creates a problem in the selection of optimal path from source node to a group of receiver nodes. So, in this paper, we have tried to control these uncertainties issues in order to conserve the network resources using fuzzy logic tool. In this mechanism all the available network metrics of the routes is converted into a single metric i.e. fuzzy cost or communication cost. The routes having minimum fuzzy cost will be considered as optimal path and the data is to be transmitted over this path from source node to a set of receivers. The simulation has been conducted using NS-2 and MATLAB, the results shows the effectiveness of the proposed protocol (EFMMRP) over ODMRP and MAODV in terms of pacaket delivery ratio, packet delivery delay and control overhead.
Article
With the advancement in wireless technologies, wireless networks are developing at a fast rate and so are the MANET's. Several routing attacks are introduced in the wireless networks due to their dynamically changing network topologies. A severe type of attack known as wormhole attack is the main theme of this paper and the work has been done to detect and prevent this attack. The work has been done with the help of DSR protocol. The existing functionality of DSR is extended so that the wormhole nodes are easily detected in the routing path and then that path is not used in the future because it is blacklisted by the network. A brief overview of the algorithm is also mentioned in the paper by which the detection and elimination of wormhole node is actually done.
Conference Paper
In a wormhole attack, wireless transmissions are recorded at one location and replayed at another, creating a virtual link under attacker control. Proposed countermeasures to this attack use tight clock synchronization, specialized hardware, or overhearing, making them difficult to realize in practice. TrueLink is a timing based countermeasure to the wormhole attack. Using TrueLink, a node i can verify the existence of a direct link to an apparent neighbor, j. Verification of a link i $ j operates in two phases. In the rendezvous phase, the nodes exchange nonces j and i. This is done with tight timing constraints, within which it is impossible for attackers to forward the exchange between distant nodes. In the authentication phase, i and j transmit a signed message ( j, i), mutually authenticating themselves as the originator of their respective nonce. TrueLink does not rely on precise clock synchronization, GPS coordinates, overhearing, geometric inconsistencies, or statistical methods. It can be implemented using only standard IEEE 802.11 hardware with a minor backwards compatible firmware update. TrueLink is meant to be used together with a secure routing protocol. Such protocols require an authentication mechanism, which will also be used by TrueLink. TrueLink is virtually independent of the routing protocol used. Our performance evaluation shows that TrueLink provides effective protection against potentially devastating wormhole attacks. 1
Conference Paper
We present a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It identifies a number of attack goals and then studies how to achieve these goals through misuses of the routing messages. To facilitate the analysis, we classify the insider attacks into two categories: atomic misuses and compound misuses. Atomic misuses are performed by manipulating a single routing message, which cannot be further divided; compound misuses are composed of combinations of atomic misuses and possibly normal uses of the routing protocol. The analysis results reveal several classes of insider attacks, including route disruption, route invasion, node isolation, and resource consumption. We also describe simulation results that demonstrate the impact of these attacks.