Skip to main content

Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET

  • Conference paper
  • First Online:
Computational Intelligence in Data Mining—Volume 2

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 411))

Abstract

Mobile ad hoc network (MANET) has attracted many security attacks due to its characteristics of dynamic topology, limited resources and decentralize monitoring. One of these vulnerable attack is wormhole in which two or more malicious nodes form a tunnel like structure to relay packets among themselves. This type of attack may cause selective forwarding, fabrication and alteration of packets being sent. In this paper, we have proposed a way to protect network from wormhole attack by using identity based signature scheme on cluster based ad hoc network. Proposed scheme does not require distribution of any certificate among the nodes so it decreases computation overhead. We have also discussed existing work that either require certifcates or does not accomplish all the security requirements of network. Our simulation results show that attack is prevented successfully and it outperforms other schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Burmeste, M., Medeiros, B.D.: On the security of route discovery in MANETs. In: Proceedings of IEEE Transactions on Mobile Computing, vol. 8, pp. 1180–1188. IEEE Press (2009)

    Google Scholar 

  2. Howarthy, N.M.P.: A survey of MANET intrusion detection prevention approaches for network layer attacks. In: Proceedings of IEEE Communications Surveys Tutorials, pp. 1–19 (2013)

    Google Scholar 

  3. Bar, R.K., Mandal, J.K., Singh, M.M.: QoS of MANET through trust based AODV routing protocol by exclusion of blak hole attack. In: Proceedings of Elsevier Technology Elsevier, pp. 530–537 (2013)

    Google Scholar 

  4. Argyroudis, P.G., Mahony, D.O.: Secure routing for mobile ad hoc networks. In: Proceedings of IEEE Communications Surveys and Tutorials. Third Quarter, vol. 7, pp. 2–21. IEEE Press (2005)

    Google Scholar 

  5. Hu, Y.-C., Perrig, A.: A survey of secure wireless ad hoc routing. In: Proceedings of IEEE Security and Privacy, p. 2839. IEEE Press (2004)

    Google Scholar 

  6. Phuong, T.V., Trong Canh, N., Lee, Y.-K., Lee, S., Lee, H.: Transmission time-based mechanism to detect wormhole attack. In: Proceedings of IEEE Asia-Paci_c Service Computing Conference (2007)

    Google Scholar 

  7. Sharma, P., Trivedi, A.: An approach to defend against wormhole attacks in ad hoc network using digital signature. In: Proceeding of IEEE (2011)

    Google Scholar 

  8. Maulik, R., Chaki, N.: A study on wormhole attacks in MANET. In: Proceeding of International Journal of Computer Information Systems and Industrial Management Applications. ISSN 2150-7988, vol. 3, pp. 271–279 (2011)

    Google Scholar 

  9. Shamir, A.: Identity-base cryptosystems and signature schemes. Proc. LNCS 196, 47–53 (1985)

    MATH  Google Scholar 

  10. Guerrero Zapata, M., Asokan, N.: Securing ad hoc routing protocols. In: Proceedings ACM Workshop on Wireless Security (WiSe), pp. 1–10. ACM Press (2002)

    Google Scholar 

  11. Hu, Y.C., Perrig, A., Johnson, D.B.: Wormhole detection in wireless ad-hoc networks. In: Department of Computer Science, Rice University, Technical Report TR01-384, June (2002)

    Google Scholar 

  12. Zhen, J., Srinivas, S.: Preventing replay attacks for secure routing in ad hoc networks. In: Proceeding of Ad Hoc Networks Wireless (ADHOCNOW’ 03), pp. 140–150 (2003)

    Google Scholar 

  13. Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of Network and Distributed System Security Symposium, p. 13141 (2004)

    Google Scholar 

  14. Khalil, I., Bagchi, S., Shro, N.B.: LITEWORP: a lightweight countermeasure for the wormhole attack in multi-hop wireless networks. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 612–621 (2005)

    Google Scholar 

  15. Tran, P.V., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: an efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In: Proceedings of 4th IEEE Consumer Communication and Networking Conference (CCNC07), pp. 593–598 (2007)

    Google Scholar 

  16. Sharma, P., Trivedi, A.: An approach to defend against wormhole attack in ad hoc network using digital signature. In: Proceedings of 3rd IEEE International Conference on Communication Soft-ware and Networks (ICCSN)

    Google Scholar 

Download references

Acknowledgments

This research work is partially funded by the Technical Quality Improvement Programme Phase II (TEQIP-II).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhruvi Sharma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer India

About this paper

Cite this paper

Sharma, D., Kumar, V., Kumar, R. (2016). Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET. In: Behera, H., Mohapatra, D. (eds) Computational Intelligence in Data Mining—Volume 2. Advances in Intelligent Systems and Computing, vol 411. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2731-1_45

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2731-1_45

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2729-8

  • Online ISBN: 978-81-322-2731-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics