• DocumentCode
    2436348
  • Title

    Wormhole attack: A new detection technique

  • Author

    Khan, Zahoor Ali ; Islam, M. Hasan

  • Author_Institution
    Electr. & Comput. Eng. Dept., Center for Adv. Studies in Eng. (CASE), Islamabad, Pakistan
  • fYear
    2012
  • fDate
    8-9 Oct. 2012
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The advancement in wireless technologies and the high availability of wireless equipment in everyday devices is a factor in the success of infrastructure-less networks. MANETs are becoming more and more common due to their ease of deployment. The high availability of such networks and the lack in security measures of their routing protocols are alluring a number of attackers to intrude. A particular type of DoS attack; known as Wormhole is the topic of discussion in this paper. A number of solutions have been proposed catering a wide range of possibilities for detection and prevention of wormholes. Literature review shows that the paths in the routing table have not been used for the detection of the wormhole attack; with a little modification to the structure of the routing table we can be able to detect suspicious links. In this paper we have proposed the use of the modified routing table for detection of the suspicious links, confirmation of wormhole existence, at the end isolating the confirmed wormhole nodes. The approach has been applied to DSDV and the detection of self-sufficient wormhole nodes and attacks. Our future work will involve the use of our own approach for detection and prevention of wormhole attacks in other protocols as well as comparison the technique with other techniques present in literature.
  • Keywords
    mobile ad hoc networks; routing protocols; telecommunication security; DoS attack; MANET; detection technique; routing protocols; routing table; security measures; suspicious link detection; wireless equipment; wireless technologies; wormhole attack; wormhole detection; wormhole prevention; Ad hoc networks; Cryptography; Hardware; Mobile computing; Protocols; Routing; Wireless sensor networks; classification; detection; routing table; taxonomy; wormhole;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Technologies (ICET), 2012 International Conference on
  • Conference_Location
    Islamabad
  • Print_ISBN
    978-1-4673-4452-4
  • Type

    conf

  • DOI
    10.1109/ICET.2012.6375443
  • Filename
    6375443