Skip to main content

Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge

  • Conference paper
  • First Online:
Innovations in Bio-Inspired Computing and Applications (IBICA 2020)

Abstract

The Optimized Link State Routing Protocol is developed for Mobile Ad Hoc Networks. It operates as a table driven, proactive protocol. The core of the OLSR is the selection of Multipoint Relays (MPRs), used as a component of a flooding mechanism. MPRs distribute control traffic messages within the network while reducing the redundancy in the flooding process. An OLSR node selects its MPR set in a manner that all two hop neighbors are reachable by the minimum number of MPRs. However, if an MPR misbehaves during the control phase, the network connectivity is then compromised. This paper introduces a new Multipoint Relays (MPR) selection algorithm with additional coverage. It also specifies an extension of the OLSR protocol in order to provide multiple disjoint paths especially for dynamic topologies. Disjoint paths are helpful for increasing network throughput, improving forwarding reliability, load balancing and security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing. IETF RFC 3561 (2003)

    Google Scholar 

  2. Johnson, D.B., Maltz, D.A., Hu, Y.-C.: The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Internet Draft, draft-ietf-manet-dsr-09 (2003)

    Google Scholar 

  3. Clausen, T., Jaquet, P.: IETF RFC 3626 Optimized Link State Routing Protocol OLSR, October 2003

    Google Scholar 

  4. Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance vector routing (DSDV) for mobile computers. In: Proceedings of the ACM SIGCOMM 1994, London, UK, pp. 234–244, October 1994

    Google Scholar 

  5. Su, M.-Y.: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Secur. 29, 208–224 (2010)

    Article  Google Scholar 

  6. Stoleru, R., Wu, H., Chenji, H.: Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Netw. 10, 1179–1190 (2012)

    Article  Google Scholar 

  7. Xu, Y., Chen, G., Ford, J., Makedon, F.: Detecting wormhole attacks in wireless sensor networks. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP International Federation for Information Processing, vol. 253, pp. 267–279. Springer, Boston (2008)

    Google Scholar 

  8. Naït-Abdesselam, F., Bensaouand, B., Taleb, T.: Detecting and avoiding wormhole attacks in wireless ad hoc networks. IEEE Commun. Mag. 46(4), 127–133 (2008)

    Article  Google Scholar 

  9. Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks. Wirel. Commun. Mob. Com. 6(4), 483–503 (2006)

    Article  Google Scholar 

  10. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006)

    Article  Google Scholar 

  11. Khalil, I., Bagchi, S., Shroff, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan, pp. 612–621, June 2005

    Google Scholar 

  12. Khalil, I., Bagchi, S., Shroff, N.B.: MobiWorp: mitigation of the wormhole attack in mobile multihop wireless networks. In: Proceedings of the IEEE Secure Communication, pp. 1–12, September 2006

    Google Scholar 

  13. Song, N., Qian, L., Li, X.: Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach. In: Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (IEEE IPDPS 2005), Denver, Colo, USA, p. 289, April 2005

    Google Scholar 

  14. Singh, J., Kaur, L., Gupta, S.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012)

    Google Scholar 

  15. Ji, S., Chen, T., Zhong, S.: Wormhole attack detection algorithms in wireless network coding systems. IEEE Trans. Mob. Comput. 14(3), 660–674 (2015)

    Article  Google Scholar 

  16. Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems (ICIIS 2014), pp. 1–6, December 2014

    Google Scholar 

  17. Patel, M., Aggarwal, A.: Two phase wormhole detection approach for dynamic wireless sensor networks. In: Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET 2016), Chennai, India pp. 2109–2112, March 2016

    Google Scholar 

  18. Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986 (2003)

    Google Scholar 

  19. Capkun, S., Buttyan, L., Hubaux, J.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21–32 (2003)

    Google Scholar 

  20. Cho, Y., Qu, G., Wu, Y.: Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks. In: Proceedings of the 1st IEEE Security and Privacy Workshops (SPW 2012), pp. 134–141, May 2012

    Google Scholar 

  21. Liu, D., Ning, P., Du, W.: Attack-resistant location estimation in sensor networks. In: Proceedings of the Fourth International Symposium on Information Processing in Sensor Networks, pp. 99–106 (2005)

    Google Scholar 

  22. Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13(1), 27–59 (2007)

    Article  Google Scholar 

  23. The Network Simulator. ns-2. http://www.isi.edu/nsnam/ns/. Accessed 20 June 2020

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hicham Zougagh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zougagh, H., Idboufker, N., El Mourabit, Y., Saadi, Y., Elouaham, S. (2021). Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge. In: Abraham, A., Sasaki, H., Rios, R., Gandhi, N., Singh, U., Ma, K. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2020. Advances in Intelligent Systems and Computing, vol 1372. Springer, Cham. https://doi.org/10.1007/978-3-030-73603-3_20

Download citation

Publish with us

Policies and ethics