In mobile ad-hoc networks, multi path routing is vulnerable since network topology is constantly changed and nodes join or leave the network frequently. So malicious nodes can drop or modify, fabricate packets for interruption of communication because of no guaranteeing reliability of nodes. Wormhole attack is one of the serious attacks which form a serious threat in the networks, especially against ad-hoc wireless routing protocols. Detection of this attack which uses colluding nodes is more difficult than attacks by single node. In this paper, we present a countermeasure for detection of wormhole attack, which efficiently mitigates the wormhole attack in ad-hoc networks. This method is based on location information of each node in DSR protocol. Each intermediate node appends its own ID with location information into a request packet and source node analyzes distance of between each node in a reply packet
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing”, In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp. 90–100, New Orleans, LA, February 1999.
D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks”, in Ad Hoc Networking, edited by Charles E. Perkins, Chapter 5, pp. 139–172, Addison-Wesley, 2001.
Rajendra V. Boppana and Satyadeva Konduru. “An Adaptive Distance Vector Routing Algorithm for Mobile, Ad Hoc Networks.”, In Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and communications Societies(INFOCOM 2001), pages 1753–1762, 2001.
B. Lu, U. W. Pooch, “Cooperative Security-Enforcement Routing in Mobile Ad Hoc Networks”, Mobile and Wireless Communications Network, 4th International Workshop, pp. 157–161, 2002.
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, E. M. B. Royer, “A Secure Routing Protocol for Ad Hoc Networks”, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
P. Papadimitratos and Z.J. Hass, “Secure Routing for Mobile Ad hoc Networks”, Proceeding of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 02), 2002.
Y. C. Hu, D. B. Johnson, A. Perrig “SEAD: Secure Efficient Distance Vector Routing For Mobile Wireless Ad Hoc Networks”, Mobile Computing Systems and Applications, Proceedings 4th IEEE Workshop, pp.3–13, 2002.
M. C. Zapata “Secure Ad hoc On-Demand Distance Vector Routing”, ACM SIGMOBILE Mobile Computing and Communications Review, Vol 6, issue 3, New work, USA, pp. 106–107, 2002.
B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocol for ad-hoc networks”, Electrical Engineering and Computer Science, University of Michigan, Tech. Rep. UM-CS-2001-037, 2001.
Y. C. Hu, A. Perrig, and D. B. Johnson. “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks”, In Proceedings of IEEE INFOCOM 2003, pp.1976–1986, 2003.
S. Capkun, L. Buttyan, and J. P. Hubaux, “SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks”, in Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 03), pp.21–32, 2003.
Hon Sun Chiu, King-Shan Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks”, In Proceedings of Wireless Pervasive Computing 2006 1st International Symposium, pp.1–6, Jan 2006.
L. Hu and D. Evans “Using Directional Antennas to Prevent Wormhole attacks”, In Proceedings of Network and Distributed System Security Symposium, pp.131–141, 2004.
Khalil, I. Saurabh Bagchi Shroff, N.B., “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks”, In Proceedings of the International Conference on Dependable Systems and Networks,(DSN’05), pp.612–621, 2005.
W. wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against Wormhole Attacks in Mobile Ad Hoc Networks”, under review at Wiley Journal Wireless Communication and Mobile Computing 2005, pp. 15:1–21, 2005.
Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh., “Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks.”, Technical Report TR 2002–44, University of Maryland, May 2002.
N. Modadugu, D. Boneh, and M. Kim, “Generating RSA keys on a handheld using an untrusted server”, in RSA 2000, 2000.
MAXIM Homepage, “http://www.maxim-ic.com/appnotes.cfm/appnote_number/2033”
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer
About this chapter
Cite this chapter
Lee, K., Jeon, H., Kim, D. (2007). Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks. In: Labiod, H., Badra, M. (eds) New Technologies, Mobility and Security. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-6270-4_30
Download citation
DOI: https://doi.org/10.1007/978-1-4020-6270-4_30
Publisher Name: Springer, Dordrecht
Print ISBN: 978-1-4020-6269-8
Online ISBN: 978-1-4020-6270-4
eBook Packages: EngineeringEngineering (R0)