Professional Documents
Culture Documents
ISBN: 978-81-925922-0-6
rohit_rana@mail.com, jayant_shekhar@hotmail.com
75
International Conference on Recent Trends in Engineering & Technology (ICRTET2012)
ISBN: 978-81-925922-0-6
76
International Conference on Recent Trends in Engineering & Technology (ICRTET2012)
ISBN: 978-81-925922-0-6
attack where in-band and out-of-band wormholes are the these assumptions are usually untrue in a harsh
two main variations. environment. Attackers can interrupt the network by
violating the protocols requirement because mobile ad-
2.2.1 In-band Wormhole hoc sensor network assumes trust and cooperation; it does
This method of wormhole attack builds up a secret not enforce node cooperation.
overlay tunnel within the active wireless medium. In-band Despite of the different specific attacks on mobile ad-hoc
wormhole could be more dangerous than out-of-band sensor network such as Denial-of-Service (DoS),
wormhole because it does not have any need for an extra impersonation, Node hijacking and so on that have been
hardware device or node and it also utilizes the existing exposed, the attacks involving multiple nodes seem to
communication medium in its routing. Self contained have received little attention. One of the possible reasons
wormhole and extended in-band wormhole are two types could be that most researchers tend to adopt ideas about
of in-band wormhole. The self-contained wormhole security measures from wired networks to ad hoc
promotes a false link connecting the attacker nodes while networks and forget that security issues regarding mobile
the extended in-band wormhole promotes its fake link ad-hoc sensor network are more complicated since mobile
between two nodes, which are none attacker nodes. The ad-hoc sensor network is unable to rely on pre-existing
latter type produces a wormhole that goes further than the infrastructure. In other words, all nodes are
attacker nodes, thus creating the end choke-points. communicating without a central authority or base station
to keep a network connected. Therefore, the existing
2.2.2 Out-of-band Wormhole security solutions for wired network cannot be directly
In this variation of wormhole, the attacker nodes create a applied to the mobile ad-hoc sensor network.
direct connection linking the two choke-points. This Wormhole attack is very powerful, and preventing the
established link is an external link that could be wired or a attack has proven to be very difficult. A strategic
kind of wireless medium. One end of the connection is placement of the wormhole can result in a significant
used to accept packets while it is forwarded using the breakdown in communication across a wireless network.
second end of the connection, thus giving room for huge In such attacks two or more malicious colluding nodes
amount of data to be transmitted through the wormhole. create a higher-level virtual tunnel in the network, which
is employed to transport packets between the tunnel
2.3 Sybil Attack endpoints. These tunnels emulate shorter links in the
network and so act as benefit to unsuspecting network
A Sybil attack is a situation where a malicious node acts nodes which by default seek shorter routes.
like two or more nodes rather than just a node like Basic vulnerabilities in mobile ad-hoc sensor network
previously mentioned attacks. The Sybil nodes are created have been researched previously ranging from their open
by series of false identities, imitations, or impersonation network medium, severe resource restriction, selfishness,
of nodes in a mobile ad-hoc sensor network, and these dynamic nature, to vulnerabilities in some protocols. In
additional node identities could be generated by just a addition, there are different categories of attacks against
physical device. mobile ad-hoc sensor network. These categories in pair
are Passive and Active attacks, Internal and External
attacks and the two categories of network-layer attacks:
4. OVERVIEW OF CURRENT Routing attacks and Packet Forwarding attacks. Our
LITERATURE research area on attacks against mobile ad-hoc sensor
Many studies on mobile ad-hoc sensor network focus on network provides not only the consequences of
the protocols used their security issues such as data collaborative attacks but also their mitigation in mobile
encryption, authentication, trust, and cooperation among ad-hoc sensor network and attack categorization. From
nodes, attacks on the protocols and proposed solutions or our perspectives, collaborative attacks are non-single
preventions. Most ad hoc routing protocols such as attacks; they are attacks launched in multiple malicious
Optimized Link State Routing (OLSR) protocol [7], Ad nodes acting as a group. Typical examples of these kinds
hoc On-Demand Distance Vector (AODV) routing of attacks are Black hole attack, Sybil attack and
protocol [6], Micro-mobility support with Efficient Wormhole attack on nodes in a mobile ad-hoc sensor
Handoff and Route Optimization Mechanisms network.
(MEHROM) protocol and wireless MAC protocols, like The literature survey provides a framework for
the 802.11 usually make assumptions about suitable and establishing the importance of the study. Within the
trusted environments, giving room for malicious activities context of a quantitative research approach, the literature
and attackers. Distributed protocols like the link-layer survey occupies a substantial amount of time and effort. It
protocols and network-layer protocols used in multi-hops provides direction for the research questions and
wireless channels communication assume that the nodes hypotheses [5]. To understand the current security issues
are cooperative in the synchronization process. However, regarding mobile ad-hoc sensor network, the literature
77
International Conference on Recent Trends in Engineering & Technology (ICRTET2012)
ISBN: 978-81-925922-0-6
survey was the essential starting step, which helped us Scenario 2 comprises of 6 nodes connected to a sub
gain in-depth knowledge about different security threats network and a CBR application is applied between nodes
related to mobile ad-hoc sensor network. Our literature 1 and 6,here we have not implemented the Mac protocol
survey helped us to understand that multiple node attacks as wormhole and thus we see that that all the packets sent
on mobile ad-hoc sensor network received a little by node 1 are received by node 6.
attention from research community in terms of properly
defining and categorizing such attack. We started to In Scenario 3 we have taken 6 nodes connected to
formulate problem, and then defined distinct keywords different sub networks. Nodes 1 and 3 connected to sub
relevant with the topic in order to search the most recent network 1, 2 and 4 to second and 5 and 6 to the third. The
materials produced by researchers. Mac protocol for sub network 2 is made wormhole .so the
packets sent by node1 are not received by 6 rather
tunneled by wormhole nodes 2 and 4.Here we see the
5. SIMULATION PARAMETER effect of wormhole attack at threshold, all drop and all
pass modes of operation .In the same way we have
5.1 GUI Configuration increased the number of nodes and analyze the effect of
This section describes how to configure Wormhole and wormhole attack at different operating modes.
Eavesdrop in the GUI.
7 SIMULATION RESULTS ANALYSIS
5.1.1 Configuring Wormhole Parameters
7.1 Running Scenario2 without Wormhole Attack
To configure the Wormhole parameters, perform the
following steps:
•To set properties at subnet level, go to the MAC Layer
tab of Wireless Subnet Properties Editor.
•To set properties at interface level, go to one of the
following locations:
6. SIMULATION ENVIRONMENT
In this case we find out the attack that degrades the
network performance .Moreover, the effects of these
kinds of attacks on mobile ad-hoc sensor network have
not been well measured since each researcher tends to use
different simulators to visualize those attacks and
determine the consequences such as impact on packet
delivery ratio, throughput, and end-to end delay
78
International Conference on Recent Trends in Engineering & Technology (ICRTET2012)
ISBN: 978-81-925922-0-6
8 Graphical Result:
8.2 Different graphical result analysis with wormhole 8.2.4 Result analysis on frame Replayed after setting the
attack: We have to find different result using the parameter wormhole :
parameter wormhole;
8 CONCLUSIONS
79
International Conference on Recent Trends in Engineering & Technology (ICRTET2012)
ISBN: 978-81-925922-0-6
work(simulation) can significantly prove to be a valuable [7] T. Clausen Ed. and P. Jacquet Ed., "Optimized link state routing
asset for future research to perform impactful protocol (OLSR)," IETF RFC 3626, October 2003.
comparisons of normal attacks with multi-node attacks on
mobile ad-hoc sensor network. As many schemes has
been purposed to claim that they can prevent and negate
the security threats in MANET, like but injecting an agent
in each node to monitor the suspicious acts in the mobile
networks or by using adjacent node to inform other nodes
about the suspicious act but none of them has yet
purposed anything that how they will deal with multi-
node attacks; like Warm-hole Attack. As it is clear from
several studies that each type of multi-node attack has a
defined plan to mitigate or set of mitigation plans that are
proposed to counter attack against that attack. However,
Cross-layer Active Rerouting (CARE), a routing resilient
architecture has theoretically claimed to be able to
alleviate direct collaborative attacks.
References:
[1] S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against
Mobile Ad Hoc Networks Routing Protocols," 2004.
80