Title :
The study on ad hoc networks security strategy based on Routing Protocols
Author_Institution :
Mudanjiang Normal Univ., Mudanjiang, China
Abstract :
Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. Our focus in this paper is to analyze the performance of reactive multicast routing protocol On Demand Multicast Routing Protocol (ODMRP) under the influence of worm hole nodes under different scenarios and design a Worm Hole Secure ODMRP (WHS-ODMRP) by applying certificate based authentication mechanism in the route discovery process. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance.
Keywords :
message authentication; mobile ad hoc networks; multicast protocols; radio links; routing protocols; telecommunication security; certificate-based authentication mechanism; higher level virtual tunnel; malicious colluding nodes; on demand multicast routing protocol; reactive multicast routing protocol; route discovery process; routing protocols-based ad hoc networks security strategy; transport packets; tunnel end points; wireless networks; worm hole secure ODMRP; wormhole attack; Ad hoc networks; Delay; Mobile computing; Routing; Tunneling; Certificate Chaining; MANET; ODMRP; Wormhole attack;
Conference_Titel :
Computer Science and Network Technology (ICCSNT), 2011 International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4577-1586-0
DOI :
10.1109/ICCSNT.2011.6181994