neighbour vala - An Approach to Mitigate Wormhole Attack in...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks ∗ Gunhee Lee, Dong-kyoo Kim Ajou University San 5, Wonchon, Suwon 443-749, Korea { icezzoco, dkkim } @ajou.ac.kr Jungtaek Seo The Attached Institute of ETRI P.O.Box 1, Yuseong, Daejeon 305-600, Korea seojt@ensec.re.kr Abstract Wormhole attack is one of the most severe threats to ad hoc networks. There have been many researches to over- come the wormhole attack. These researches, however, still have some limitations to handle wormhole attacks properly such as burden of computation, complicated steps before making up a session, and no response method. In this paper, we propose an effective wormhole attack defense method that can properly detect wormhole attacks and respond to them. Each node maintains its neighbors’ information. Ac- cording to the information, each node can identify replayed packet that forwarded by two attackers. We analyze the ef- fectiveness of the proposed method and the efficiency of the approach by using traffic and memory space measure. 1. Introduction A mobile ad hoc network consists of some mobile nodes without any communication infrastructure. Each node can freely join and leave the networks and move around the network. Every communication is performed by exchang- ing messages between sender and receiver, and each mes- sage is delivered to the destination by being forwarded from node to node. These characteristics are able to make the ad hoc networks become suitable for dynamic mobile services. Thus, ad hoc networks are coming under the spotlight today as an important application of ubiquitous computing envi- ronment. As ad hoc networks are merging into the various mobile computing environments, security becomes one of the most important requirements. There have been many researches on enhancing the security of mobile ad hoc net- works. Especially, secure routing protocols have been de- veloped in recent several years. However these researches only focus on the attacks by single attacker. They have not ∗ This research was supported in part by the MIC (Ministry of Informa- tion and Communication), Korea, under the ITRC (Information Technol- ogy Research Center) support program supervised by the IITA (Institute of Information Technology Advancement) (IITA-2006-(C1090-0602-0011)) considered the collusion attacks, which multiple attackers cooperate with each other in order to compromise any tar- get node or intercept useful information. Wormhole attack is one of the most severe threats to ad hoc networks among them. A pair of attackers forms a tun- nel (wormhole) to exploit received packets at the other area of the network. One attacker replays the packets that are for- warded from another attacker. Thus attackers can do harm to both the sender and the receiver by dropping packets or acquiring service illegally. Many researches have been per- formed to detect the attacks [3, 5, 6, 7]. However, these re- searches still have some limitations such as burden of com-...
View Full Document

Page1 / 6

neighbour vala - An Approach to Mitigate Wormhole Attack in...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online