25-08-2017, 09:32 PM
Detection of Wormhole Attack in MANET
SEMINAR III REPORT.pdf (Size: 318.35 KB / Downloads: 45)
Abstract
A mobile ad-hoc network (MANET) is a collection of mobile nodes which communi-
cate over radio. These kind of networks are very
exible, thus they do not require any
existing infrastructure or central administration. Protocols for MANET are designed
based on assumption that all nodes are fully cooperative.Due to open structure and
scarely available battery based energy,node missbehaviour may exist,that is some self-
ish node refuse to forward data. MANET has gained popularity and lots of research is
being done on dierent aspects of MANET. It is an infrastructure less network having
no xed base stations MANET is characterized by dynamic topology low bandwidth
and low power consumption. All the nodes in the network are moving i.e. topology of
the network is dynamic so the nodes can act both as host as well as router to route
information unnecessary for its use. This kind of infrastructure-less network is very
useful in situation in which ordinary wired networks is not feasible like battleelds,
natural disasters etc. The nodes which are in the transmission range of each other
communicate directly otherwise communication is done through intermediate nodes
which are willing to forward packet hence these networks are also called as multi-hop
networks.
Introduction
The Mobile means moving and ad hoc means temporary without any xed infras-
tructure so mobile ad hoc networks are a kind of temporary networks in which nodes
are moving without any xed infrastructure or centralized administration has gained
popularity and lots of research is being done on dierent aspects of MANET. MANET
is an infrastructure less network having no xed base stations MANET is character-
ized by dynamic topology low bandwidth and low power consumption. All the nodes
in the network are moving i.e. topology of the network is dynamic so the nodes can
act both as host as well as router to route information unnecessary for its use. This
kind of infrastructure-less network is very useful in situation in which ordinary wired
networks is not feasible like battleelds, natural disasters etc. The nodes which are in
the transmission range of each other communicate directly otherwise communication
is done through intermediate nodes which are willing to forward packet hence these
networks are also called as multi-hop Networks. [1]
Challlenges in MANET
MANET many times faces some challenges beacause of its dynamic topology. These
are as follows.
1 No infrastructure
2 Peer-to-peer architecture with multi-hop routing
3 Mobile device physical vulnerability
4 Stringent resource constraints
5 Wireless medium
6 Node mobil
Network Security
Security is an indispensable need for both wired and wireless network communica-
tions. Unlike wired networks, wireless networks pose a number of challenges to security
solutions due to their unpredictable topology; wireless shared medium, heterogeneous
resources and stringent resource constraints etc. There are a wide variety of attacks
that target the weakness of this kind of network. In this type of network, security
is not a single layer issue but a multilayered one. We have focused on network layer
where the possible attacks are most vulnerable. There are ve major security goals
that need to be addressed in order to maintain a reliable and secure ad-hoc network
environment. They are mainly:
1 Condentiality: Protection of any information from being exposed to unin-
tended entities. In ad hoc networks this is more dicult to achieve because
intermediates nodes receive the packets for other recipients, so they can easily
eavesdrop the information being routed.
2 Availability: Services should be available whenever required. There should
be an assurance of survivability despite a Denial of Service (DOS) attack. On
physical and media access control layer attacker can use jamming techniques to
interfere with communication on physical channel. On network layer the attacker
can disrupt the routing protocol. On higher layers, the attacker could bring down
high level services.
Security Challenges in MANET
Wireless communications are easy to intercept and dicult to contain. Next
to this it is easy to actively insert or modify wireless messages. This means
that unprotected Adhoc wireless networks are open to a wide range of attacks,
including node impersonation, message injection, loss of condentiality, etc.
2 In many situations the nodes may be left unattended in a hostile environment.
This enables adversaries to capture them and physically attack them. Proper
precautions are required to prevent attackers from extracting secret information
from them. Even with these precautions, we cannot exclude that a fraction of
the nodes may become compromised. This enables attacks launched from within
the network.
3 The dynamic topology and the absence of a supporting infrastructure render
most of the existing cryptographic protocols useless as they were not developed
for this dynamic environment. Any security solution with a static conguration
would not suce. Security mechanisms should be able to adapt on-the-
y to
these changes in topology.
4 Many wireless nodes will have a limited energy resource Security solutions should
be designed with this limited energy budget in mind.
Finally, an Adhoc network may consist of thousands of nodes. Security mechanisms
should be scalable to handle such a large network.
Applications of Adhoc Networks
With the increase of portable devices as well as progress in wireless communication,
ad hoc networking is gaining importance with the increasing number of widespread
applications. Adhoc networking can be applied anywhere where there is little or no
communication infrastructure or the existing infrastructure is expensive or inconvenient
to use. Adhoc networking allows the devices to maintain connections to the network
as well as easily adding and removing devices to and from the network. The set of
applications is diverse, ranging from large-scale, mobile, highly dynamic networks,
to small, static networks that are constrained by power sources. Besides the legacy
applications that move from traditional infrastructured environment into the ad hoc
context, a great deal of new services will be generated for the new environment. It
includes:
Motivation
A wormhole attack is a particularly severe attack on MANET routing where two attack-
ers connected by a high-speed o-channel link called the wormhole link. The wormhole
link can be established by using a network cable and any form of wired link technology
or a long-range wireless transmission in a dierent band. The end-point of this link
(wormhole nodes) is equipped with radio transceivers compatible with the ad hoc or
sensor network to be attacked. Once the wormhole link is established, the adversary
record the wireless data they overhear, forward it to each other, and replays the packets
through the wormhole link at the other end of the network. Replaying valid network
messages at improper places, wormhole attackers can make far apart nodes believe
they are immediate neighbors, and force all communications between aected nodes to
go though them A wormhole attack is equally dangerous for both proactive and on-
demand protocols. It should be nodded that wormholes are dangerous by themselves,
even if attackers are diligently forwarding all packets without any disruptions, on some
level, providing a communication service to the network. With wormhole in place,
aected network nodes do not have a true picture of the network, which may disrupt
the localization-based schemes, lead to the wrong decisions, etc. Wormhole can also be
used to simply aggregate a large number of network packets for the purpose of trac
analysis or encryption compromise. a wormhole link is simply unreliable, as there is
no way to protect what the attackers can do and when. Simply put the wormholes are
compromising network security whether they are actively disrupting routing or not. As
in the literature review we got comparatively ZRP is much better and MAR-AODV
is better.so to detect the wormhole attacks proposed system will work using ZRP or
MAR-AODV.
Open Source Tools
There are many open source available freely on network.[5]
1 QualNet simulator
QualNet simulator is designed for wireless network simulation and it supports many
kinds of wireless routing protocol. It has a network model library and protocol library.
It has GUI and can be easily expended. It can be installed in Linux or Windows OS.
In this paper, we install it in Linux.
2 DIANEmu
It is a discrete-event simulator developed at Karlsruhe University (Germany). It aims
to enable the simulation of ad hoc applications in realistic contexts. So far, most
simulators have been designed to permit simulations at a protocol-level. DIANEmu's
approach is dierent: it assumes that the lowest network layers (up to the fourth
one) are available. DIANEmu then focuses on the application model. DIANEmu
belongs to a new class of simulators which allow the large-scale simulation of high-
level applications such as gaming and e-business. DIANEmu provides a complete
environment for application design. Its simulation engine is closely coupled to its
graphical interface. Attesting of its modern design, its measurement system is event-
driven. More precisely it denes that to each event class is associated to a given
handler (referred to as a gauge). This handler is then dynamically invoked when the
events of the specied class occur. This technique is detailed in section DIANEmu is
written in Java and is free.
3 GloMoSim It is developed at UCLA (California, USA). It is the second most popular
wireless network simulator. GloMoSim is written in Parsec and hence benets from
the latter's ability to run on shared-memory symmetric processor (SMP) computers.
New protocols and modules for Glo-MoSim must be written in Parsec too. GloMoSim
respects the OSI standard. The parallelization technique used by GloMoSim is the
same than pdns's one; that is the network is split in dierent subnetworks, each of
them being simulated by distinct processors. The network is partitioned in such a way
that the number of nodes simulated by each partition is homogeneous. GloMoSim
Conclusion
The existing system can be improved so that easy wormhole attack can be detected.and
we can observe that the particular proposed system is an improved technology than
already existing system. Thus the proposed system when compared with the metrics
like PDER, THROUGHPUT, End to End Delay must provide better simulation. The
proposed system may give denitely better than the existing system to detect the
wormhole attack and prevent attack by removing malicious attacks