Wormhole Attack Detection in Geographic Routing Protocol

Wormhole Attack Detection in Geographic Routing Protocol

Authors

  • K. Anita Davamani, S. Amudha

Keywords:

BSR Protocol, Worm Hole Attack, Signature based Verification Technique, NS2, Geographic Routing, Intrusion, MANET

Abstract

As mobile ad hoc network applications are deployed, security emerges as a
central requirement. Position aided routing protocols can offer a significant performance
increase over traditional ad hoc routing protocols. Boundary State Routing is a geographic
routing protocol which routes the data using the location of the nodes. Geographic routing
protocols are known to be particularly susceptible to attacks. In this paper, we present the
possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc
networks is wormhole attack in which two or more colluding attackers record packets at
one location, and tunnel them to another location for a replay at that remote location. A
wormhole attack is very powerful, and preventing the attack has proven to be very difficult.
In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR
protocol. The first method namely Counter March Technique attempts to detect the
intrusion action .The second technique namely Signature Based Verification Technique
uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects
the fake route but also adopts preventive measures against action wormhole nodes from
reappearing during routing. The proposed system is designed in Boundary state routing
protocol and analysis and simulations are performed in network simulator.

Downloads

Published

25-02-2017

Issue

Section

Articles
Loading...