cluster based wormwhole IDS - International Journal of...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009 A N EW C LUSTER - BASED W ORMHOLE I NTRUSION D ETECTION A LGORITHM FOR M OBILE A D - HOC N ETWORKS 1 Debdutta Barman Roy, 2 Rituparna Chaki, 3 Nabendu Chaki 1 Calcutta Institute of Engineering and Management, Kolkata, India, barmanroy.debdutta@gmail.com 2 West Bengal University of Technology, Kolkata 700064, India, rchaki@ieee.org 3 University of Calcutta, 92 A.P.C. Road, Kolkata 700009, India nabendu@ieee.org A BSTRACT In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is often equated with strong and feasible node authentication and lightweight cryptography. Unfortunately, the wormhole attack can hardly be defeated by crypto graphical measures, as wormhole attackers do not create separate packets. They simply replay packets already existing on the network, which pass the cryptographic checks. Existing works on wormhole detection have often focused on detection using specialized hardware, such as directional antennas, etc. In this paper, we present a cluster based counter-measure for the wormhole attack, that alleviates these drawbacks and efficiently mitigates the wormhole attack in MANET. Simulation results on MATLab exhibit the effectiveness of the proposed algorithm in detecting wormhole attacks. K EY WORDS MANET, Wormhole, Cluster, Guard Node, routing 1. I NTRODUCTION Mobile wireless ad hoc networks are fundamentally different from wired networks, as they use wireless medium to communicate, do not rely on fixed infrastructure, and can arrange them into a network quickly and efficiently. In a Mobile Ad Hoc Network (MANET), each node serves as a router for other nodes, which allows data to travel, utilizing multi-hop network paths, beyond the line of sight without relying on wired infrastructure. Security in such networks, however, is a great concern [1, 2, 7, 8]. The open nature of the wireless medium makes it easy for outsiders to listen to network traffic or interfere with it. Lack of centralized control authority makes deployment of traditional centralized security mechanisms difficult, if not impossible. Lack of clear network entry points also makes it difficult to implement perimeter-based defense mechanisms such as firewalls. Finally, in a MANET nodes might be battery-powered and might have very limited resources, which may make the use of heavy-weight security solutions undesirable [2, 3, 7, 8, 13]. A wormhole attack is a particularly severe attack on MANET routing where two attackers, connected by a high-speed off-channel link, are strategically placed at different ends of a network, as shown in figure 1. These attackers then record the wireless data they overhear, forward it to each other, and replay the packets at the other end of the network. Replaying valid 44
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 9

cluster based wormwhole IDS - International Journal of...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online