Beruflich Dokumente
Kultur Dokumente
Figure 5.Network with Wormhole attack The Graphs [Figure 6] are plotted with respect of above Table
1. Graph show that high defection of RTT and RSS value and
Again we use the same network but this time there are two hop count when wormhole attack in the network.
rogue access points attempting an attack on the network, let us
consider these access points to be RAP_0 and RAP_1, as
shown in figure 5. A packet is sent from access point AP5 of
network A destined for AP_1 of network B, which was
captured by RAP_0 and forwarded to RAP_1 before it reaches
AP_1. Now RAP_1 releases the captured packet directing it to
access point AP_1 in network B. As we know, in the case of
[3] C. Karlof, D. Wagner, “Secure routing in sensor networks:
attacks and countermeasures”, First IEEE International
Workshop on Sensor Network Protocols and Applications,
2003.
[4] Y.C. Hu, A. Perrig, D.B. Johnson, “Packet leashes: a
defense against wormhole attacks in wireless networks”,
Proceedings of the 22nd INFOCOM, 2003, pp. 1976– 1986
[5] V.S.Shankar Sriram, K.K.Agrawal, G.Saho “Detecting and
Eliminating Rouge Access Points in IEEE-802.11 WLAN - A
Multi-Agent Sourcing Methodology” IEEE International
Advance Computing Conference (IACC’2010), Conference
Proceedings ISBN: 978-1-4244-4791-6, IEEE Catalog
Number: CFP1039F-CDR.
[6] B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A
secure routing protocol for ad-hoc networks,” Electrical
Engineering and Computer Science, University of Michigan,
Figure 6.Deflection of RTT, RSS & Hop Count in a wormhole scenario
Tech. Rep. UM-CS-2001-037, August 2001.
[7] P. Papadimitratos and Z. Haas, “Secure routing for mobile
VII. CONCLUSION AND FUTURE WORK
ad hoc networks,” in SCS Communication Networks and
Wormhole attacks are significant problems that need to be Distributed Systems Modeling and Simulation Conference
addressed in wireless network security. Wormhole attacks are (CNDS 2002), January 2002.
powerful attacks that can be conducted without requiring any [8] Y. C. Hu, A. Perrig, and D.B. Johnson, “Packet leashes: a
cryptographic breaks. In this paper, we have presented a defense against wormhole attacks in wireless networks,”
classification for possible wormhole attack in Infrastructure Proceedings of the 22nd Annual Joint Conference of the IEEE
based wireless Architecture. We have proposed a model for Computer and Communications Societies (INFOCOM), pp.
securing WLANs from wormhole using fusion mapping. It is 1976-1986, 2003.
simple, cost effective and less network resource consuming. [9] Defense Advanc ed Research Projects Agency. Frequently
Also this system architecture employs efficient mapping Asked Questions v4 for BAA 01-01, FCS Communications
between access point to access point for detection and Technology. Washington, DC. Available at
prevention of wormhole in WLANs. The proposed fusion http://www.darpa.mil/ato/solicit/baa01_01faqv4.doc, October
mapping algorithm proves efficient in terms of reduced 2000.
computational overhead when compared to that of existing [10] S. Capkun, L. Buttya´n, J.-P. Hubaux, “SECTOR: secure
cryptographic mechanism. More over this architecture is tracking of node encounters in multihop wireless networks”,
simple and easily implementable. In future we will try to Proceedings of the First ACM Workshop on Security of Ad
overcome some more sophisticated wormholes using Mobile hoc and Sensor Networks (SASN 03), 2003, pp. 21–32.
agents. Additionally, we are anticipating the inclusion of new [11] L. Hu, D. Evans, Using directional antennas to prevent
features for the framework that can further improve its wormhole attacks, in: Proceedings of Network and Distributed
wireless network protection abilities. System Security Symposium, 2004.
[12] Y. Ko, V. Shankar kumar, N. Vaidya, “Medium access
VIII. REFERENCES
control protocols using directional antennas in ad hoc
[1] V.S.Shankar Sriram, Ashish Pratap Singh, G.Sahoo networks”, Proceedings of the 19th Annual JointConference of
“Methodology for securing wireless LANs against Wormhole the IEEE Computer and Communications Societies
attack”, International Journal of Recent Trends in Engineering, (INFOCOM), 2000, pp. 13–21.
Issue. 1, Vol. 1, May 2009 [13] R. Choudhury, X. Yang, R. Ramanathan, N. Vaidya,
[2] Lingxuan Hu David Evans “Using Directional Antennas to “Using directional antennas for medium access control in ad
Prevent Wormhole Attacks”, Department of Computer hoc networks”, 8th ACM International Conference on Mobile
Science University of Virginia Charlottesville, VA [lingxuan, Computing and Networking (MobiCOM), 2002
evans]@cs.virginia.edu