A two-phase wormhole attack detection scheme in MANETs

Shiva Shamaei, A. Movaghar
{"title":"A two-phase wormhole attack detection scheme in MANETs","authors":"Shiva Shamaei, A. Movaghar","doi":"10.22042/ISECURE.2015.6.2.7","DOIUrl":null,"url":null,"abstract":"Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole attack is a kind of such threats against routing processes which is particularly a challenging problem to detect and prevent in MANETs. In this paper, a two-phase detection scheme is proposed to detect and prevent wormhole attacks. First phase checks whether a wormhole tunnel exists on the selected path or not. If there is such a tunnel, the second phase is applied to confirm the existence of the wormhole attack, and locate a malicious node. The proposed detection scheme can appropriately detect all types of this kind of attacks such as in-band and out-of-band ones in different modes such as hidden or exposed, without any need of special hardware or time synchronization. In order to evaluate the performance of the proposed scheme, some various scenarios are simulated in the NS-2 simulator, and different measures are assessed. The results obtained from simulating the proposed scheme and other benchmarks indicate that in most criteria considered in this paper, the proposed scheme outperforms the proposed methods in prior works.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ISC Int. J. Inf. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22042/ISECURE.2015.6.2.7","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

Abstract

Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole attack is a kind of such threats against routing processes which is particularly a challenging problem to detect and prevent in MANETs. In this paper, a two-phase detection scheme is proposed to detect and prevent wormhole attacks. First phase checks whether a wormhole tunnel exists on the selected path or not. If there is such a tunnel, the second phase is applied to confirm the existence of the wormhole attack, and locate a malicious node. The proposed detection scheme can appropriately detect all types of this kind of attacks such as in-band and out-of-band ones in different modes such as hidden or exposed, without any need of special hardware or time synchronization. In order to evaluate the performance of the proposed scheme, some various scenarios are simulated in the NS-2 simulator, and different measures are assessed. The results obtained from simulating the proposed scheme and other benchmarks indicate that in most criteria considered in this paper, the proposed scheme outperforms the proposed methods in prior works.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种面向无线网络的两阶段虫洞攻击检测方案
移动自组织网络(manet)没有固定的基础设施,所以所有的网络操作,如路由和数据包转发都是由节点自己完成的。然而,几乎所有常见的现有路由协议基本上都关注性能度量,而不考虑安全问题。由于这些协议认为所有节点都是可信的,因此容易受到严重的安全威胁。虫洞攻击是一种针对路由进程的威胁,是无线网络中一个特别具有挑战性的问题。本文提出了一种检测和预防虫洞攻击的两阶段检测方案。第一阶段检查所选路径上是否存在虫洞隧道。如果存在这样的隧道,则第二阶段用于确认虫洞攻击的存在,并定位恶意节点。本文提出的检测方案可以在不需要特殊硬件和时间同步的情况下,以隐藏或暴露等不同的方式,适当地检测到各种类型的带内和带外攻击。为了评估该方案的性能,在NS-2模拟器中模拟了不同的场景,并对不同的措施进行了评估。仿真结果和其他基准测试表明,在本文考虑的大多数标准中,本文提出的方案优于先前工作中提出的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
相关文献
[Cicatricial pemphigoid of Brunsting Perry].
IF 3.2 Actas dermo-sifiliograficasPub Date : 1979-05-01 DOI:
P Iranzo, C Herrero, J Castro, T Castel, M Lecha
[Cicatricial pemphigoid (Brunsting-Perry)].
IF 0.7 Przeglad dermatologicznyPub Date : 1980-01-01 DOI:
J Bogdaszewska-Czabanowska, T Chorzelski
Brunsting perry cicatricial pemphigoid.
IF 2.9 4区 医学Indian Journal of Dermatology Venereology & LeprologyPub Date : 2000-11-01 DOI:
R R Mittal, J Kullar, P S Sethi
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
One-Shot Achievable Secrecy Rate Regions for Quantum Interference Wiretap Channel Quantum Multiple Access Wiretap Channel: On the One-Shot Achievable Secrecy Rate Regions Towards a Formal Approach for Detection of Vulnerabilities in the Android Permissions System Towards event aggregation for reducing the volume of logged events during IKC stages of APT attacks A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1