using aodv - 2009 Fourth International Conference on...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks Marianne A. Azer Computer Dept. National Telecommunication Institute Cairo, Egypt mazer@nti.sci.eg Sherif M. El-Kassas Computer Science Dept. American University in Cairo Cairo, Egypt sherif@aucegypt.edu Magdy S. El-Soudani Electronics and Communications Dept. Cairo University, Faculty of Engineering Cairo, Egypt melsoudani@menanet.net Abstract —Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper, we propose a scheme for the wormhole attack prevention in ad hoc networks. The scheme relies on the idea that usually the wormhole nodes participate in the routing in a repeated way as they attract most of the traffic. Therefore, each node will be assigned a cost depending in its participation in routing. The cost function is chosen to be exponential in powers of two such that to rapidly increase the cost of already used nodes. Besides preventing the network from the wormhole attack, the scheme provides a load balance among nodes to avoid exhausting nodes that are always cooperative in routing. In addition, a better network performance has been achieved in terms of traffic. Keywords- Ad Hoc Network; attacks; routing; security; wormhole attack. I. INTRODUCTION A wireless ad-hoc network consists of a collection of autonomous peer mobile nodes that self-configure to form a network and have no pre-determined organization of available links. The broadcast nature of the radio channel introduces characteristics in ad hoc wireless networks that are not present in their wired counterparts. Ad hoc networks are vulnerable to attacks due to many reasons; amongst them are the absence of infrastructure, wireless links between nodes, limited physical Protection, the Lack of a centralized monitoring or management, and the resource constraints. One of the most famous attacks on this type of networks is the wormhole attack. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper we suggest a scheme to prevent this attack based on its effects. The remainder of this paper is organized a follows. In section II, we explain briefly the Ad Hoc on Demand Distance Vector (AODV) protocol used for routing in ad hoc networks, the wormhole attack and the effort done in the literature to combat this attack. In section III, we present our proposed scheme. Simulation results are presented in section IV and finally, conclusions and future work are given in section V.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/19/2012 for the course CS 1313 taught by Professor Aman during the Spring '12 term at Punjab Engineering College.

Page1 / 7

using aodv - 2009 Fourth International Conference on...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online