MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network

被引:0
作者
Tu T. Vo
Ngoc T. Luong
Doan Hoang
机构
[1] Hue University of Sciences,Faculty of Information Technology
[2] Hue University,Faculty of Mathematics and Informatics Teacher Education
[3] Dong Thap University,Faculty of Engineering and Information Technology
[4] The University of Technology Sydney,undefined
来源
Wireless Networks | 2019年 / 25卷
关键词
MLA; MLAMAN; Mobile ad hoc network; Multi-level authentication; Network security;
D O I
暂无
中图分类号
学科分类号
摘要
Wormhole attack is a serious security issue in Mobile Ad hoc Network where malicious nodes may distort the network topology and obtain valuable information. Many solutions, based on round trip time, packet traversal time, or hop-count, have been proposed to detect wormholes. However, these solutions were only partially successful in dealing with node high-speed mobility, variable tunnel lengths, and fake information by malicious nodes. To address those issues, this paper proposes a novel multi-level authentication model and protocol (MLAMAN) for detecting and preventing wormhole attacks reliably. MLAMAN allows all intermediate nodes to authenticate control packets on a hop-by-hop basis and at three levels: (1) the packet level where the integrity of the packets can be verified, (2) the node membership level where a public key holder-member can be certified, and (3) the neighborhood level where the neighborhood relationship between nodes can be determined. The novelty of the model is that it prevents malicious nodes from joining the network under false information and pretense. It detects wormhole nodes effectively under various scenarios including variable tunnel lengths and speeds of moving nodes. The effectiveness of our approach is confirmed by simulation results through various scenarios.
引用
收藏
页码:4115 / 4132
页数:17
相关论文
共 49 条
[1]  
Akilarasu G(2017)Wormhole-free routing and DoS attack defense in wireless mesh networks Wireless Networks 23 1709-1718
[2]  
Shalinie SM(1976)New directions in cryptography IEEE Transactions on Information Theory 22 644-654
[3]  
Diffie W(2012)A survey on routing algorithms for wireless ad-hoc and mesh networks Computer Networks 56 940-965
[4]  
Hellman ME(2017)A novel approach for mitigating route request flooding attack in MANET Wireless Networks 24 565-579
[5]  
Eiman A(2018)A novel approach for mitigating gray hole attack in MANET Wireless Networks 3 1976-1986
[6]  
Biswanath M(2003)Packet leashes: A defense against wormhole attacks in wireless networks Twenty-second annual joint conference of the IEEE computer and communications societies 1 13-64
[7]  
Gurung S(2003)Mobile ad hoc networking: Imperatives and challenges Ad Hoc Networks 35 1249-1259
[8]  
Chauhan S(2012)Security threats and solutions in MANETs: A case study using AODV and SAODV Journal of Network and Computer Applications 9 5022-5039
[9]  
Gurung S(2009)A hop-count analysis scheme for avoiding wormhole attacks in MANET Sensors 11 11,122-11,140
[10]  
Chauhan S(2011)A New MANET wormhole detection algorithm based on traversal time and hop count analysis Sensors 13 6651-6668