A Wormhole Attack Detection and Prevention Techniq
A Wormhole Attack Detection and Prevention Techniq
net/publication/319871042
CITATIONS READS
12 1,670
3 authors, including:
Some of the authors of this publication are also working on these related projects:
The Use of Computational Intelligence for Security in Named Data Networking View project
All content following this page was uploaded by Amin Karami on 18 November 2017.
1
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
2
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
address and time of receiving the packet. When a node overhears posed algorithm uses local monitoring of all neighbouring nodes
a route request after wormhole prevention timer, then a wormhole and relies on a secure central authority for positiontracking of the
attack is taking place. If a wormhole link is found, the information mobile nodes. The use of central authurity is contacted only in the
is stored at the source node to isolate them from taking part in the event of motion. Central authority node will still operate through
routing again. This is effective because it does not stop the flow periods in the event that its unreachable. The first proposed algo-
of packets between legitimate nodes. However, it suffers from false rithm is selfish move protocol (SMP). In this protocol, the mobile
positive. WADP is an improved WAP by Juni Biswas [4] for worm- node can only generate, send and receive its own traffic. This design
hole attack detection. It combines node authentication to remove arises from the knowledge that a node can only be able to launch
false positives and helps in exact location mapping of wormhole in an attack by forwarding packets. However, this protocol may cause
a modified AODV routing protocol. a disconnection in the network if a large part of the nodes moves
at the same time. To address this issue, the researcher developed a
3.3 Digital Signature Approach second algorithm called connectivity aided protocol with constant
velocity (CAPCV). This protocol eliminates lack of connectivity
In defending against malicious nodes using digital signature, this
thereby allowing the mobile node to forward packets.
reasearch proposed a mechanism whereby verification of neigh-
bours node signature is significant. In every legitimate nodes in the
network there contains the digital signature of all the remaining le- 3.5 Special Hardware-based Approach
gitimate nodes of the same network. For example for a route request
Generally, the most common method to detect and prevent worm-
to take place, sender first create a secure route between source and
hole is the use of neighbour discovery mechanism. Sometimes they
destination. This in turn distinguish between legitimate and mali-
are achieved through the use of special hardware such as direc-
cious nodes, because malicious nodes does not possess the original
tional antennal [11]. Similarly, Srdjan Capkun [6] proposed SEC-
digital signature [22].
TOR based on a special hardware. Others approaches towards this
In the same sense Amarijit et al. [20] developed a novel technique
attack includes time synchronization for detection of whether pack-
combining both princicles of clustering and digital signature during
ets sent from an authorized neighbour are received on time by the
route discovery using the same AODV routing protocol. Informa-
legitimate node [8]. Hu et al. (2003) [12] Introduced packet leashes
tion of all nodes is grouped in different clusters, and each cluster
in defending against wormhole attack. Two solutions were intro-
has a cluster head and a gateway nodes which forms a communica-
duced, temporal and geographical. With geographical leashes, lo-
tion link to different cluster head in the same network. To establish
cation information from GPS devices which is included in the pack-
a route betweeen nodes, it must first send route request to its cluster
ets, is used to detect the presence of wormhole nodes. And with
head. This cluster head will further forward the request to the other
temporal leashes, nodes are tightly time synchronised, thus packet
clusters after it has been digitally signed using a private key con-
transmitted between source and destination contains time at which
tained in the cluster head; through the gateway link until the request
it was sent. Furthermore protocols can be adjusted to estimate the
reaches the cluster head of the cluster which belongs to the destina-
distance betweeen the sender and the receiver. Using the network
tion node. Simulation result for this research prooved it archieved
signal, it can be verified whether or not the data comes from the
high level of detecting and preventing wormhole attack.
node within the range of communication.
Transmitting data in a network efficiently is the key most important
aspect of routing. Marti et al. [21] proposed two techniques watch-
dog and pathrater in detecting malicious node with minimal effect 3.6 Statistical Analysis Approach
on throughput in the presence of misbehaving nodes. One of this
Some other approach in this regards applies a centralised mech-
technique is called watchdog. It is used for every nodes in the same
anism that makes use of statistical analysis for the detection of
network to detect any misbehaving node. When a packet is sent to
malicious node [23]. This mechanism can detect the presence of
the next hop, it tries overhear the packet forwarded by the next hop.
a malicious node due to specific changes in the statistical pat-
For example a path from S to D through nodes A,B and C. node
tern. Analysing the issue of encrypting and decrypting packets sent
A cannot transmit to C without an intermediate node B. therefore
across each node. Pravin Khandare et al. [19] used the RSA tech-
when A transmits to B for onward forward to C, A will often tell if
nique for encryption and decryption of the nodes. It uses the 2Ack
B transmit the same packet successfully to the correct node C oth-
mechanism to check that only the authenticated node receives the
erwise it considers the next hop as malicious node. The pathrater
data. Acknowledgement is taken from one hop and two hop nodes.
uses the information about misbehaving nodes gained from the first
In cases where an attacker tries to forward the received message
technique (watchdog) to pick the route which is most likely legit-
into another location, this mechanism will prevent this by taking
imate. Every node maintains a trust rating for each of the nodes
the acknowledgements from the next two nodes.
in the network. When watchdog detects a malicious node, the trust
rating of the node is updated negatively. Techinically the pararater
calculates a path metric by averaging the nodes ratings in the path 3.7 Routing Protocol
to pick a safe route to send packets. This solution however, is better
To discover multiple paths between the source and the destina-
suited for traditional networks based on emphasis on the reliability
tion, we applied a reactive routing protocol called Ad hoc On-
of point to point communication than to sensor networks.
Demand Distance Vector (AODV) which was developed on July
3.4 Local Monitoring Approach 2003. AODV offers quick adaptation to dynamic link conditions
and uses low processing and memory overhead between participat-
Issa Khalil et al. (2005) [18] proposed two algorithms called MO- ing mobile nodes in an established network. AODV routing table
BIWORP in the elimination of any wormhole attack when ad-hoc is fields consist of destination IP address, sequence number of des-
in a mobility state. In this research paper a node is assigned to be the tination node, hop count to destination and next hop to follow. It
central authority which monitors the nodes neighbours locally. If also defines three types of control messages for up to date route
any malicious nodes is found, it isolates the node globally. The pro- maintenance [24]:
3
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
—RREQ: every route request carries a time to live (TTL) value that range of Node(A) is increased to 2r. After this increase, node(A)
indicates the number of hops the packet should be forwarded. It broadcast beacon message containing node(B) information to its
is set to a predefine value at discovery stage and increased at neighbour of node(C). during this message, both nodes B and C
retransmission if no reply is received by the receiving node. will not change their transmission range. After node(C) hears this
—RREP: Route reply message is rebroadcast back to the source of broadcast, it then verifies the authenticity of node(A) from node(B)
a RREQ to confirm if the receiver is the real request address user because both node A and B had earlier exchange their information
or a valid route to the requested address. in the first broadcast. The beacon frame will be transmitted at reg-
—RERR: All node monitors the activities and link status of their ular intervals until packet gets to its destination successfully. After
neighbour in active route path. When there is a breakage in the each change in radius of transmitting nodes, a test nodes updates
link, a RERR message is broadcasted to notify other nodes of the its neighbour node in the next beacon time.
lost link. For this to be activated, each node has to keep informa- —If N(C) contains N(B) but not contained in N(A) then wormhole
tion such as IP address for each of its neighbours.
detected
In On-demand distance vector routing protocol, each node main- —If N(C) contains N(B) and meets N(A) then no wormhole is de-
tains a routing table and gets updated every time a routing message tected
is received. For a source node to send a packet, it broadcast Route
request message to the whole of the network. On acknowledging The schematic of the proposed algorithm for wormhole attack de-
the request by the other nodes, it checks if the corresponding route tection and elimination is given in Figure 3.
exist and check to make sure is not a repeated request. If it is a re-
peated one, the node simply discard the packet. If not the request 4.1.2 TRM AODV: Wormhole Attack Detection. Input: Worm-
will be accepted. This process is repeated till packets gets to its des- hole path for data transmission, neighbours information.
tination. The intermediate node to the destination node will send a Output: Wormhole detection, periodically update the neighbour
route reply RREP to the source of the packet using a reverse route. list using beacon.
The node A and B is used as two tested nodes to describe the main
wormhole detection procedure of TRM algorithm. In proposed al-
4. THE PROPOSED METHOD gorithm, all nodes in the network has a current information of
There are two important parts contained in the detection and pre- its neighbours. Moreover, the neighbour list is updated frequently.
vention of wormhole attack, neighbour and path verification. Two Each node will request its neighbours to retrieve their neighbour
fake node neighbours with a wormhole tunnel will generally not lists by sending a beacon message to its neighbours. At the discov-
share a common one hop neighbour node. while two genuine node ery stage, all nodes will send its own neighbour information to its
neighbours will generally share other true neighbours between neighbours by sending beacon frames. Using this steps, each node
them. The proposed technique is to improve the existing algorithm can get its neighbour details within two hops. At the end, network
in [26]. This technique will detect wormhole and isolate them from topology will be founded. The beacon information will be sent at
the route path. During the neighbour route discovery, the packet regularly at intervals. After changing the radius transmission range,
will be encrypted at each level by sharing hello messaging with a test node will update its neighbour node details in the next beacon
neighbouring node. The packet will be decrypted by the receiving time. By comparing its current neighbour details with the previous
node and message must matched with the one distributed. details, a test node can now establish the existence of false topology
if any, that should not exist in a normal network.
4.1 Algorithm Description
4.1.3 APS AODV: Wormhole Free Alternate Path Selection (The
This work is based on the prevention of wormhole attack in a par- proposed method). Input: Wormhole attack detection.
ticular network. In this research, a detection and prevention mech- Output: Secure data transmission via attack elimination.
anism is proposed in securing the communications between source After wormhole detection, if wormhole link exists in that current
and destination node. When sensor node wants to start communica- route, then block that route and update it in the routing table. An-
tion, the first thing it does is a neighbour discovery from the neigh- other route is fetched from the routing table for secure data trans-
bour list. It generates an encrypted beacon message with a secret mission. Hop count of alternate path is compared with the current
key. As soon as the neighbouring node receives this beacon frame, path. Hop count will be higher in alternate path than wormhole
it will be decrypted and the acknowledgement (RREP) is sent back path. In such case, alternate path is confirmed with the availabil-
to the sender. ity of alternate path without the involvement of wormhole nodes.
Algorithm 1 provides the pseudocode of the proposed APS AODV
4.1.1 Neighbour verification. The following steps will verify a (Alternative Path Selection by AODV) algorithm for wormhwhole
neighbouring node in the network. attack detection and elimination.
Building one-hop transmission neighbourhood list: Two neigh-
bour nodes such as S and P which has their neighbour has N(S) and
N(P) individually. Their neighbour list information exchange will 5. EXPERIMENTAL RESULTS
be shared through a beacon messages. E.g. node S notifies its near- The performance of the base paper TRM AODV is evaluated for
est neighbour N(S) with a periodic beacon message. the simulation settings as per the following model and compared
Building two-hop transmission neighbourhood list: Each node with the proposed proposal (APS AODV) and also with normal
will request its neighbours to collect information about their neigh- scenario in which there is no wormhole present. In addition, to as-
bours list by way of transmitting beacon messages to its neigh- sess the robustness and effectiveness of the proposed method, we
bours. This will enable each node to hold two hop information compare the results with a pre-existing algorithm developed in [2]
about their neighbours. For example, information exchanged be- called AOMDV. We conducted experiments on Network Simula-
tween nodes A, B and C. Node(A) sends a beacon message to its tor 2.35 (NS-2) which is an open-source discrete event simulator in
neighbour Node(B), after this message is sent, the transmission the research of computer communication networks. NS2 consists of
4
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
Data: Given: Network N with node radius r, nodes n and m are 5.1 Performance Metrics
nearest neighbours, wormhole number c = 0 The results obtained from four techniques are compared through
Result: wormhole detection and elimination three parameters including throughput (Eq. 1), end-to-end delay
Starts RREQ; (Eq. 2), and packet delivery ratio (Eq. 3).
Generate HELLO beacon message while all sensors maintains the
same communication range; (1) Throughput: The amount of data successfully reached at the
while check every node in N do destination per unit of time.
expand radius of m to R = 2r;
for each node n in N(m) do do Total number o f received pckts at dst
T hroughput (bits/s) =
if there exists once d ∈ Nn and d ∈
/ Nm then Simulation time
c = c + 1; (1)
else (2) End-to-End delay: The time taken for a packet to reach the
when wormhole link exists, fetch another route destination from the source node.
(verified by hop count comparison);
end
end End − to − End delay (s) = ∑ Delay f or each data packet
end (2)
Algorithm 1: The pseudocode of the proposed method (3) Total number of delivered data packets: A ratio of the total
received packets at the destination to the total packets gener-
ated by source node in the presence of both wormhole attack
traffic and normal traffic.
Packets received
two languages, C++ for internal mechanism (backend) of the simu- Packet Delivery Rate = ∗ 100 (3)
Packets generated
lation objects and OTcl for assembling and configuring the objects
by schedluing the events. The simulation parameters are shown in Table 1.
5
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
Simulator NS-2
Number of nodes 1 40, 70, 100
Wormhole pairs 1 (Wormhole nodes 2)
Speed variation 10 ms
Area 1000 m x 1000 m
Communication range 250 m
Interface type Phy/WirelessPhy
MAC type IEEE 802.11
Queue type Droptail/Priority Queue
Queue length 50 packets
Antenna type Omni antenna
Propagation type TwoRayGround
Routing protocol AODV, TRM AODV and APS AODV
Transport agent UDP
Application agent CBR (a) Before luanching attack
Packet size 1024 bytes
Simulation time 100 s
Mobility model RWP
6
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017
7
International Journal of Computer Applications (0975 - 8887)
Volume 174 - No.4, September 2017