PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES

Marianne Amir Azer, Sherif Mohammed El-Kassas, Mady Saiid El-Soudani

2009

Abstract

Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features, they are vulnerable to many attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper we explain the wormhole attack modes and propose two schemes for the wormhole attack prevention in ad hoc networks. The schemes rely on the idea that usually the wormhole nodes participate in the routing in a repeated way as they attract most of the traffic. Therefore, each node will be assigned a cost depending in its participation in routing. The cost function is chosen to be exponential in powers of two such that to rapidly increase the cost of already used nodes. Besides preventing the wormhole attack, these schemes provide a load balance among nodes to avoid exhausting a node that is always cooperative in routing.

Download


Paper Citation


in Harvard Style

Amir Azer M., Mohammed El-Kassas S. and Saiid El-Soudani M. (2009). PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 69-74. DOI: 10.5220/0002178400690074

in Bibtex Style

@conference{secrypt09,
author={Marianne Amir Azer and Sherif Mohammed El-Kassas and Mady Saiid El-Soudani},
title={PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={69-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002178400690074},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
SN - 978-989-674-005-4
AU - Amir Azer M.
AU - Mohammed El-Kassas S.
AU - Saiid El-Soudani M.
PY - 2009
SP - 69
EP - 74
DO - 10.5220/0002178400690074