DocumentCode :
3351768
Title :
A Novel Approach for Avoiding Wormhole Attacks in VANET
Author :
Safi, Seyed Mohammad ; Movaghar, Ali ; Mohammadizadeh, Misagh
Author_Institution :
Dept. of Comput. Eng., Islamic Azad Univ., Ahvaz, Iran
Volume :
2
fYear :
2009
fDate :
28-30 Oct. 2009
Firstpage :
160
Lastpage :
165
Abstract :
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network topology. This attack severely disrupts the network operation, especially in networks that use on demand routing protocols such as AODV or DSR. In this paper we try to introduce an efficient method to prevent wormhole attack in vehicular ad hoc networks and detect malicious nodes as far as possible. Occurrence of this type of attack in vehicular networks may cause irreparable lost and therefore the presented method in this paper concentrates on AODV. Routing protocols for unicast application can be extended to other sending protocols regardless of being unicast, broadcast or multicast. In this paper, we use packet leashes and new method of authentication called HEAP. Also, some correction has been done on packet leashes method. We will prove this scheme can avoid wormhole attack in these types of networks for all applications easily. We want to show that our suggested scheme has low overhead, increases security and performance in an acceptable level in the network.
Keywords :
ad hoc networks; routing protocols; telecommunication security; AODV; VANET; authentication method; malicious nodes; network broadcasting; network topology; packet leashes method; routing protocols; security of data; unicast application; vehicular ad hoc networks; wormhole attacks; Ad hoc networks; Authentication; Broadcasting; Computer networks; Computer science; Data security; Multicast protocols; Network topology; Routing protocols; Unicast; AODV; HEAP; Packet Leashes; Wormhole;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Engineering, 2009. WCSE '09. Second International Workshop on
Conference_Location :
Qingdao
Print_ISBN :
978-0-7695-3881-5
Type :
conf
DOI :
10.1109/WCSE.2009.787
Filename :
5403263
Link To Document :
بازگشت