JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET

被引:2
作者
Bagade, Sudhir [1 ]
Raisinghani, Vijay [2 ]
机构
[1] SNDT Univ, Mumbai, Maharashtra, India
[2] NMIMS, Sch Engn, Mumbai, Maharashtra, India
来源
INFORMATION SYSTEMS SECURITY | 2016年 / 10063卷
关键词
Wormhole attack; Jitter; Ad-hoc networks; Wireless security;
D O I
10.1007/978-3-319-49806-5_24
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the decentralized nature of Mobile Ad-hoc Network (MANET), it is exposed to many attacks. One such attack is a wormhole attack which is formed by connecting two or more malicious nodes at distant locations. Existing literature assumes that, if a wormhole tunnel is created it would always have a higher delay than the average per hop delay. Further, it is assumed that a wormhole does not have variable delay. This assumption would not hold in case of newer routing protocols such as Lightweight On-demand Ad-hoc Distance-vector Routing Protocol - Next Generation (LOADng). We propose an algorithm JITWORM, which can detect wormholes with variable delay. We detect the wormhole attack during route discovery phase and data transmission phase. JITWORM detects wormholes by employing a mechanism of analyzing the jitter applied to packets by the nodes. Each node monitors the jitter applied to packets by its neighboring nodes. If the percentage of packets to which jitter is not applied is greater than a set threshold then a wormhole is assumed to be present. After successful detection of a wormhole, it can be isolated from the network. We compare our work with the existing techniques and show that in case of LOADng routing protocol the existing techniques would fail to detect wormholes. Our simulation results and analysis shows that JITWORM is successfully able to detect a wormhole even in presence of variable delay.
引用
收藏
页码:444 / 458
页数:15
相关论文
共 21 条
[1]   A Survey of Secure Mobile Ad Hoc Routing Protocols [J].
Abusalah, Loay ;
Khokhar, Ashfaq ;
Guizani, Mohsen .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (04) :78-93
[2]  
[Anonymous], IEEE INT C SENS NETW
[3]  
Awerbuch B, 2008, ACM T INFORM SYST SE, V10, DOI [10.1145/1284680.1284686, 10.1145/1284680.1341892]
[4]  
Clausen, 2008, 5148 IETF RFC
[5]  
Clausen, 2015, LOADNG IN PRESS
[6]   LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks [J].
Giannetsos, Thanassis ;
Dimitriou, Tassos .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :618-643
[7]   Wormhole attacks in wireless networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :370-380
[8]   Wormhole Attack Detection Algorithms in Wireless Network Coding Systems [J].
Ji, Shiyu ;
Chen, Tingting ;
Zhong, Sheng .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (03) :660-674
[9]   LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks [J].
Khalil, I ;
Bagchi, S ;
Shroff, NB .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :612-621
[10]   Detecting wormhole attacks in wireless networks using connectivity information [J].
Maheshwari, Ritesh ;
Gao, Jie ;
Das, Samir R. .
INFOCOM 2007, VOLS 1-5, 2007, :107-+