Ad Hoc LAN Protocol-Based Defense Wormhole Attack Method

  • Yu Zhang
  • Xin Feng
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 126)


As no Center, self-organization, changing topology and so on, the routing protocol security is more terrible in ad hoc network than in wired network. The wormhole attack is one of them. The malicious node add will disrupt routing protocol that depend on node’s broadcasting through the receive datagram for every neighbor, and then, it will scramble to listen or destroy. This article analyzes the wormhole attack principle that some relevant way first. After that, under the condition of regional OLSR protocol, the paper presents the idea which broadcasts key in different geographical neighbor node. In that case, even though the malicious nodes get the packets, it is unable to decrypt the packet, achieving effective defensing passive wormhole attack. Finally, the model is applied to OLSR routing protocol and simulated in NS2, verifying the feasibility of the scenarios.


Ad Hoc Worknet Wormhole Attack OLSR Protocol Broadcasting Key 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Maheshwari, R., Gao, J., Das, S.R.: Detecting Wormhole Attack in Wireless Networks Using Connectivity Information. Stony Brook, NY 11794–4400, USAGoogle Scholar
  2. 2.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole Detection in Wireless Ad Hoc Networks. Rice University Department of Computer Science Technical Report TR01-384, December 17 (2001) (revised: June 15, 2002)Google Scholar
  3. 3.
    Hu, Y.C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attack in wireless networks. In: INFOCOM (2003)Google Scholar
  4. 4.
    Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium, NDSS (2004)Google Scholar
  5. 5.
    Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Journal of Wireless Networks, WINET (2005)Google Scholar
  6. 6.
    Anjum, F., Mouchtaris, P.: Security for Wireless Ad Hoc Networks, pp. 103–107. Tsinghua University Press (March 2009); Qian Quan translatesGoogle Scholar
  7. 7.
    Hong, L., Hong, F., Peng, B., Chen, J.: A Wormhole Defensive Mechanism Based on the Neighbor Credit Evaluation. Computer Science 33(8), 130–133 (2006)Google Scholar
  8. 8.
    Liu, W., Chai, Q.: The Method of Using the Principle of Wormhole to Withstand Black Hole Attack. Computer Engineering and Design 28(20), 4888–4890 (2007)Google Scholar
  9. 9.
    Liu, N., Han, F., Zhang, W., Cheng, Y.: Removing Special Attack in Adhoc Network. Computer Engineering and Design 26(6), 1486–1488 (2005)Google Scholar
  10. 10.
    Yao, S.: Defensive Strategy Research Based on the Worm Attack of OLSP Routing Protocol. Master’s Degree Thesis of the University of Electronic Science and Technology, Xi’an, China (May 2009)Google Scholar
  11. 11.
    Liu, N.: Research on the Moving Ad Hoc Network Security Routing and Simulation Realization in the Light of Wormhole, Master’s Degree Thesis of Shandong University. Jinan, China (April 2005)Google Scholar
  12. 12.
    Pang, L., et al.: The Authentication and Key Negociation Protocol between Wireless Sensor Network Nodes. Chinese Journal of Sensors and Actuators 21(8), 1422–1426 (2008)Google Scholar
  13. 13.
    Pang, L., Li, H., Jiao, L., Wang, Y.: The Wireless Sensor Network Broadcasting Key Distribution Protocol Based the Secret Sharing. Chinese Journal of Sensors and Actuators 21(10), 1777 (2008)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  • Yu Zhang
    • 1
  • Xin Feng
    • 1
  1. 1.School of Computer and TechnologyChangchun University of Science and TechnologyChangchunChina

Personalised recommendations