Abstract
Mobile ad hoc network (MANET) has attracted many security attacks due to its characteristics of dynamic topology, limited resources and decentralize monitoring. One of these vulnerable attack is wormhole in which two or more malicious nodes form a tunnel like structure to relay packets among themselves. This type of attack may cause selective forwarding, fabrication and alteration of packets being sent. In this paper, we have proposed a way to protect network from wormhole attack by using identity based signature scheme on cluster based ad hoc network. Proposed scheme does not require distribution of any certificate among the nodes so it decreases computation overhead. We have also discussed existing work that either require certifcates or does not accomplish all the security requirements of network. Our simulation results show that attack is prevented successfully and it outperforms other schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Burmeste, M., Medeiros, B.D.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 8, pp. 1180–1188. IEEE Press (2009)
Howarthy, N.M.P.: A survey of MANET intrusion detection prevention approaches for network layer attacks. In: Proceedings of IEEE Communications Surveys Tutorials, pp. 1–19 (2013)
Bar, R.K., Mandal, J.K., Singh, M.M.: QoS of MANET through trust based AODV routing protocol by exclusion of blak hole attack. In: Proceedings of Elsevier Technology Elsevier, pp. 530–537 (2013)
Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials. Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005)
Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, p. 2839. IEEE Press (2004)
Phuong, T.V., Trong Canh, N., Lee, Y.-K., Lee, S., Lee, H.: Transmission time-based mechanism to detect wormhole attack. In: Proceedings of IEEE Asia-Paci_c Service Computing Conference (2007)
Sharma, P., Trivedi, A.: An approach to defend against wormhole attacks in ad hoc network using digital signature. In: Proceeding of IEEE (2011)
Maulik, R., Chaki, N.: A study on wormhole attacks in MANET. In: Proceeding of International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988, vol. 3, pp. 271–279 (2011)
Shamir, A.: Identity-base cryptosystems and signature schemes. Proc. LNCS 196, 47–53 (1985)
Guerrero Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002)
Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad-hoc networks. In: Department of Computer Science, Rice University, Technical Report TR01-384, June (2002)
Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Proceeding of Ad Hoc Networks Wireless (ADHOCNOW’ 03), pp. 140–150 (2003)
Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of Network and Distributed System Security Symposium, p. 13141 (2004)
Khalil, I., Bagchi, S., Shro, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multi-hop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 612–621 (2005)
Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In: Proceedings of 4th IEEE Consumer Communication and Networking Conference (CCNC07), pp. 593–598 (2007)
Sharma, P., Trivedi, A.: An approach to defend against wormhole attack in ad hoc network using digital signature. In: Proceedings of 3rd IEEE International Conference on Communication Soft-ware and Networks (ICCSN)
Acknowledgments
This research work is partially funded by the Technical Quality Improvement Programme Phase II (TEQIP-II).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer India
About this paper
Cite this paper
Sharma, D., Kumar, V., Kumar, R. (2016). Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining—Volume 2. Advances in Intelligent Systems and Computing, vol 411. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2731-1_45
Download citation
DOI: https://doi.org/10.1007/978-81-322-2731-1_45
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2729-8
Online ISBN: 978-81-322-2731-1
eBook Packages: EngineeringEngineering (R0)