Browse > Article
http://dx.doi.org/10.9708/jksci/2012.17.11.073

A Design of ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) based on Positional Information and Hop Counts on Ad-Hoc  

Lee, Byung-Kwan (Dept. of Computer, Kwandong University)
Jeong, Eun-Hee (Dept. of Regional Economics, Kangwon National University)
Abstract
This paper proposes an ETWAD(Encapsulation and Tunneling Wormhole Attack Detection) design based on positional information and hop count on Ad-Hoc Network. The ETWAD technique is designed for generating GAK(Group Authentication Key) to ascertain the node ID and group key within Ad-hoc Network and authenticating a member of Ad-hoc Network by appending it to RREQ and RREP. In addition, A GeoWAD algorithm detecting Encapsulation and Tunneling Wormhole Attack by using a hop count about the number of Hops within RREP message and a critical value about the distance between a source node S and a destination node D is also presented in ETWAD technique. Therefore, as this paper is estimated as the average probability of Wormhole Attack detection 91%and average FPR 4.4%, it improves the reliability and probability of Wormhole Attack Detection.
Keywords
Wormhole Attack Detection; Positional Information; Hop Count; Group Authentication Key; Ad-hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Yih-ChunHu, "Wormhole Attack in Wireless Networks," IEE EJournal, Communication, Vol.24, No.2, pp. 370-380, Feb. 2006
2 Yih-Chun Hu, Adrian Perrig and David B. Johnson, "Packet Leashes : A Defense against Wormhole Attacks in Wireless AdHoc Networks," In Proceedings of IEEE INFOCOM 2003, pp.1976-1986, April 2003
3 Adrian Perrig, Ran Canetti, J. D. Tygar, andDawn Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," Security and Privacy 2000 IEEE, pp.56-73, May 2000
4 R. L. Rivest, "Amethod for obtaining digital signature and public-key cryptosystems," Communication of the ACM, Vol.21, No.2, pp.120-126, Feb. 1978   DOI   ScienceOn
5 Intae Kim, Seungjin Han and Junghyun Lee, "Wormhole Detection using Multipath in Sensor Network," KSCI review, Vol.15, No.1, pp.77-81, 2007
6 Issa Khalil, Saurabh Bagehi and Nesss B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," In Proceedings of the International Conference on Dependable Systemand Networks, pp.612-621, 2005
7 A. VANI and D. Sreenivasa Rao, "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks," IJCSE, Vol.3, No.6, pp. 2377-2384, June 2011
8 Khin Sandar Win, "Analysis of Detecting Wormhole Attack in Wireless Networks," World Academy of Science, Engineering andTechnology 48, pp.422-423, 2008
9 Jun Jie Piao and TaeMu Chang, "Transmission Power Based Source Routing Protocol for Mobile Ad Hoc Networks with Unidirectional Links," ICHIT 2011, LNCS Vol.6935, pp. 146-153, Sept. 2011
10 Rakesh Babu Bobba, Laurent Eschenauer, Virgil Gligor and William Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks." Technical Report TR 2002-44, University of Maryland, May 2002
11 The Network Simulator NS-2, http://www.isi.edu/ nsnam/ns/
12 Nam: Network Animator, http://www.is.edu/nsnam/ nam