Skip to main content

Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks

  • Chapter
New Technologies, Mobility and Security

In mobile ad-hoc networks, multi path routing is vulnerable since network topology is constantly changed and nodes join or leave the network frequently. So malicious nodes can drop or modify, fabricate packets for interruption of communication because of no guaranteeing reliability of nodes. Wormhole attack is one of the serious attacks which form a serious threat in the networks, especially against ad-hoc wireless routing protocols. Detection of this attack which uses colluding nodes is more difficult than attacks by single node. In this paper, we present a countermeasure for detection of wormhole attack, which efficiently mitigates the wormhole attack in ad-hoc networks. This method is based on location information of each node in DSR protocol. Each intermediate node appends its own ID with location information into a request packet and source node analyzes distance of between each node in a reply packet

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing”, In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100, New Orleans, LA, February 1999.

    Google Scholar 

  2. D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139–172, Addison-Wesley, 2001.

    Google Scholar 

  3. Rajendra V. Boppana and Satyadeva Konduru. “An Adaptive Distance Vector Routing Algorithm for Mobile, Ad Hoc Networks.”, In Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and communications Societies(INFOCOM 2001), pages 1753–1762, 2001.

    Google Scholar 

  4. B. Lu, U. W. Pooch, “Cooperative Security-Enforcement Routing in Mobile Ad Hoc Networks”, Mobile and Wireless Communications Network, 4th International Workshop, pp. 157–161, 2002.

    Google Scholar 

  5. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. B. Royer, “A Secure Routing Protocol for Ad Hoc Networks”, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.

    Google Scholar 

  6. P. Papadimitratos and Z.J. Hass, “Secure Routing for Mobile Ad hoc Networks”, Proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 02), 2002.

    Google Scholar 

  7. Y. C. Hu, D. B. Johnson, A. Perrig “SEAD: Secure Efficient Distance Vector Routing For Mobile Wireless Ad Hoc Networks”, Mobile Computing Systems and Applications, Proceedings 4th IEEE Workshop, pp.3–13, 2002.

    Google Scholar 

  8. M. C. Zapata “Secure Ad hoc On-Demand Distance Vector Routing”, ACM SIGMOBILE Mobile Computing and Communications Review, Vol 6, issue 3, New work, USA, pp. 106–107, 2002.

    Article  Google Scholar 

  9. B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad-hoc networks”, Electrical Engineering and Computer Science, University of Michigan, Tech. Rep. UM-CS-2001-037, 2001.

    Google Scholar 

  10. Y. C. Hu, A. Perrig, and D. B. Johnson. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks”, In Proceedings of IEEE INFOCOM 2003, pp.1976–1986, 2003.

    Google Scholar 

  11. S. Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 03), pp.21–32, 2003.

    Google Scholar 

  12. Hon Sun Chiu, King-Shan Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, In Proceedings of Wireless Pervasive Computing 2006 1st International Symposium, pp.1–6, Jan 2006.

    Google Scholar 

  13. L. Hu and D. Evans “Using Directional Antennas to Prevent Wormhole attacks”, In Proceedings of Network and Distributed System Security Symposium, pp.131–141, 2004.

    Google Scholar 

  14. Khalil, I. Saurabh Bagchi Shroff, N.B., “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks”, In Proceedings of the International Conference on Dependable Systems and Networks,(DSN’05), pp.612–621, 2005.

    Google Scholar 

  15. W. wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against Wormhole Attacks in Mobile Ad Hoc Networks”, under review at Wiley Journal Wireless Communication and Mobile Computing 2005, pp. 15:1–21, 2005.

    Google Scholar 

  16. Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh., “Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks.”, Technical Report TR 2002–44, University of Maryland, May 2002.

    Google Scholar 

  17. N. Modadugu, D. Boneh, and M. Kim, “Generating RSA keys on a handheld using an untrusted server”, in RSA 2000, 2000.

    Google Scholar 

  18. MAXIM Homepage, “http://www.maxim-ic.com/appnotes.cfm/appnote_number/2033”

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this chapter

Cite this chapter

Lee, K., Jeon, H., Kim, D. (2007). Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks. In: Labiod, H., Badra, M. (eds) New Technologies, Mobility and Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6270-4_30

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-6270-4_30

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-6269-8

  • Online ISBN: 978-1-4020-6270-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics