SlideShare a Scribd company logo
Presented By:-
Harsh Kishore Mishra
M.Tech. Cyber Security II Semester
OUTLINE
• Introduction
• Mobile Ad-Hoc Network
• Applications of MANET
• Challenges and Issues
• Attacks on MANET
• Wormhole Attack
• Past Work towards Wormhole Attack
• Technique to be used
• Conclusion
INTRODUCTION
• Wireless Networks are ubiquitous and provides great
advantages.
• Two types of wireless networks, Infrastructure and Ad Hoc
• Ad Hoc networks attracts great attention.
• Provides convenience, mobility, scalability, cost and Easy
Setup.
• Vulnerable to various attacks due to functionality and
deployment scenario.
MOBILE ADHOC NETWORK
An infrastructure less collection of mobile nodes that can arbitrarily change their
geographic locations such that these networks have dynamic topologies and random
mobility with constrained resources.
MOBILE ADHOC NETWORK
• A collection of wireless mobile nodes that communicate with each
other without the use of any pre established network infrastructure.
• It is decentralized, all network and routing activities are handled by
nodes.
• Wireless nodes are free to move and causes dynamic topology.
• Nodes operates by co operating with each other for data.
• Suitable for situations and applications where infrastructure is not
possible.
APPLICATIONS OF MANETS
• Military communication and operations
• Automated battlefields
• Emergency services
• Search and rescue operations
• E-commerce: electronic payments
anytime and anywhere
• Business: dynamic database access,
mobile offices
• Personal area networks (PAN)
• Networks at construction sites
• Universities, Virtual classrooms and
campus settings
• Ad hoc communications during
meetings or lectures
• Multi-user games
• Wireless P2P networking and Outdoor
Internet access
CHALLENGES AND ISSUES
• Routing
• Service and Resource Discovery
• Security and Node Cooperation
• Dynamic Topology
• No Centralized Authority
• Bandwidth Constraint
• Limited Energy Source
• No Predefined Boundary
ATTACKS ON MANET
• Eavesdropping
• Denial of Service
• Jamming
• Black hole Attack
• Rushing Attack
• Wormhole Attack
• Sinkhole Attack
• Session hijacking
WORMHOLE ATTACK
• Wormhole nodes fake a route that is shorter than the original one
within the network; this can confuse routing mechanisms which rely
on the knowledge about distance between nodes.
• It has one or more malicious nodes and a tunnel between them.
• The attacking node captures the packets from one location and
transmits them to other distant located node which distributes them
locally.
• A wormhole attack can easily be launched by the attacker without
having knowledge of the network or compromising any legitimate
nodes or cryptographic mechanisms.
WORMHOLE ATTACK
The tunnel is either the wired link or a high frequency links. This
creates the illusion that the two end points of the tunnel are very close
to each other.
ATTACK MEDIUM
In Band Attack Out of Band Attack
ATTACKING MODES
Wormhole Attack
Modes
Hidden Modes
Packet
Encapsulation
Packet Replay
Participation
Modes
High Power
Transmission
Out of Band
• 1) Packet Encapsulation: Each packet is routed via the legitimate path
only, when received by the wormhole end, gets encapsulated to prevent
nodes on way from incrementing hop counts. The packet is brought into
original form by the second end point.
• 2) Out-of-Band: This two-ended wormhole, a dedicated out-of-band high
bandwidth channel is placed between end points to create a wormhole link.
• 3) High-Power-Transmission: This kind of wormhole approach has only
one malicious node with much high transmission capability that attracts
the packets to follow path passing from it.
• 4) Packet Relay: In packet relay two malicious nodes relay packet
between two nodes which are far apart from each other and
convenience these nodes that they are neighbor.
EFFECTS OF THE ATTACK
• Selectively drop data packets
• Routing disruption
• Traffic analysis for information leaking.
• Bypasses and attracts a large amount of network traffic
• Collect and manipulate network traffic like modifying packets,
changing the sequence of packets, and etc.
• By analyzing collected network data, the attacker can perform many
other more aggressive attacks, such as man-in-the-middle attacks,
cipher breaking, protocol reverse engineering etc.
EXISTING SOLUTIONS TOWARDS
WORMHOLE ATTACKS
• Concept of geographical and temporal packet leashes
• Directional Antenna
• Connectivity Based Approach
• Transmission Time Based Mechanism
• LITEWORP and MOBIWORP
• Digital Signature based Approach
• Diffusion of Innovation theory based Approach
• Protocol Specific Solutions
• SAM (Statistical Analysis of Multipath)
• Graphical and Topological Information based Approaches
Method Requirements Comments
Packet Leaches Geographical
and Temporal
Loosely synchronized clocks
Straightforward solution but
has general limitations of GPS
technology
Directional Antennas
Nodes use specific ‘sectors’ of
their antennas to
communicate
with each other
It is not directly applicable to
other networks
Connectivity based
approaches
connectivity information and
need tightly synchronized
clocks
Requirements are not realistic
MOBIWORP and LITEWORP
Loosely synchronized clocks
and Central Authority
Applicable to static network
Digital Signature based
Nodes should know each
other’s Digital Signature
Computation time
Method Requirements Comments
Diffusion of Innovation Based Nodes confirmation
End to end delay is increased
Transmission Time based
Calculation of RTT between
nodes
Accuracy of RTT
Protocol Specific Modification in Protocols Works for specific protocols
SAM
Statistically calculation of
relative frequency of path
Non Multi hop path protocol
not supported
Graphical and topological
based
Miscellaneous Protocol specific, limitations
TECHNIQUE TO BE USED
• Introduced by Dong et al., named as WormPlaner
• Based on the planarity of graph, which is drawn based on the
connectivity information.
• No Special hardware or synchronization needed.
• WormPlanar exploits location free network planarization technique
to perform connectivity based wormhole detection to detect symptoms
of attack.
WORMPLANER
• A connected planarization topology is extracted from normal Network Graph.
• Planarization algorithm will fail in case of wormhole attack, so planarity can be
validated to confirm worm hole attack.
• WormPlaner Protocol has two stages, Local Planarity Test and Refinement process.
• Local planarity test is applied on each node to collect k-hop neighbors information.
• Then Planarization algorithm will be applied on each node’s neighborhood sub
graph.
• Nodes, failing planarity test will be suspected node and further refinement process
will be applied to detect sure wormhole nodes.
• Further, Refinement Process is applied to eliminate false positives.
WORMPLANER
Advantages
• Foolproof Solution
• Detects all malicious nodes
• No False positives
Limitation
• Merely detection is possible, no
avoidance solution
Wormhole attack
REFERENCES
• Aarti, S. S. T. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks.
International Journal of Advanced Research in Computer Science and Software Engineering, 3(5).
• de Graaf, R., Hegazy, I., Horton, J., & Safavi-Naini, R. (2010). Distributed detection of wormhole attacks in
wireless sensor networks Ad Hoc Networks (pp. 208-223): Springer.
• Dong, D., Li, Z., Liu, Y., & Liao, X. (2009). Wormcircle: Connectivity-based wormhole detection in wireless ad hoc
and sensor networks. Paper presented at the Parallel and Distributed Systems (ICPADS), 2009 15th
International Conference on.
• Dong, D., Liao, X., Liu, Y., Li, X.-Y., & Pang, Z. (2013). Fine-grained location-free planarization in wireless sensor
networks. Mobile Computing, IEEE Transactions on, 12(5), 971-983.
• HAOYANG, H., FANYE, SONGWULU, ANDLIXIA ZHANG,. (2004). Security in mobile ad hoc networks:
Challenges and solutions UCLA Previously Published Works.
• Hu, L., & Evans, D. (2004). Using Directional Antennas to Prevent Wormhole Attacks. Paper presented at the
NDSS.
• Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in
Communications, IEEE Journal on, 24(2), 370-380.
• Jeroen Hoebeke, I. M., Bart Dhoedt and Piet Demeester. An Overview of Mobile Ad Hoc Networks: Applications
and Challenges.
REFERENCES
• Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc
Networks, 6(3), 344-362.
• Khan, Z. A., & Islam, M. H. (2012, 8-9 Oct. 2012). Wormhole attack: A new detection technique. Paper presented at the Emerging
Technologies (ICET), 2012 International Conference on.
• Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing wormhole attacks on wireless ad hoc networks: a
graph theoretic approach. Paper presented at the Wireless Communications and Networking Conference, 2005 IEEE.
• Özdemir, S., Meghdadi, M., & Güler, Ý. (2008). A time and trust based wormhole detection algorithm for wireless sensor networks. Paper
presented at the manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC’08).
• Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded
Computing Systems (TECS), 3(3), 634-660.
• Priyanka Goyal, V. P., Rahul Rishi. (2011). MANET: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of
Computational Engineering & Management, 11.
• Qian, L., Song, N., & Li, X. (2007). Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis
approach. Journal of Network and Computer Applications, 30(1), 308-330.
• Rashid Sheikhl Mahakal Singh Chandee, D. K. M. (2010). Security Issues in MANET: A Review IEEE.
• Saurabh Upadhyaya, B. K. C. (2011). Impact of Wormhole Attacks on MANETs. International Journal of Computer Science & Emerging
Technologies, 2(1).
REFERENCES
• Shams Qazi, R. R., Yi Mu, Willy Susilo. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks.
Journal of Network and Computer Applications.
• Tran Van Phuong, N. T. C., Young-Koo Lee, Sungyoung Lee, Heejo Lee. (2007). Transmission Time-based Mechanism to
Detect Wormhole Attacks Paper presented at the Asia-Pacific Services Computing Conference.
• Vani, A., & Rao, D. S. (2011). A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In
Ad Hoc Wireless Networks. International Journal on Computer Science and Engineering (IJCSE), 3(6), 2377-2384.
• Venkataraman, R., Pushpalatha, M., Rao, T. R., & Khemka, R. (2009). A graphtheoretic algorithm for detection of
multiple wormhole attacks in mobile ad hoc networks. International Journal of Recent Trends in Engineering (IJRTE),
1(2), 220-222.
• Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks.
Wireless Communications and Mobile Computing, 6(4), 483-503.
• Xiaopei, L., Dezun, D., & Xiangke, L. (2013, 1-4 Oct. 2013). WormPlanar: Topological Planarization Based Wormhole
Detection in Wireless Networks. Paper presented at the Parallel Processing (ICPP), 2013 42nd International Conference
on.
• Xiaopei Lu, D. D., Xiangke Liao. (2013). WormPlanar: Topological Planarization based Wormhole Detection in
WirelessNetworks. Paper presented at the 42nd International Conference on Parallel Processing.

More Related Content

PPTX
Black hole attack
Richa Kumari
 
PPT
security in wireless sensor networks
Vishnu Kudumula
 
PPTX
Mac protocols
juno susi
 
PDF
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
PPT
Attacks in MANET
Sunita Sahu
 
PPTX
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
PPTX
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Darwin Nesakumar
 
Black hole attack
Richa Kumari
 
security in wireless sensor networks
Vishnu Kudumula
 
Mac protocols
juno susi
 
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 
Attacks in MANET
Sunita Sahu
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
ISSUES IN AD HOC WIRELESS NETWORKS
Dushhyant Kumar
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Darwin Nesakumar
 

What's hot (20)

PPTX
Security issues in manet
flowerjaan
 
PPTX
Schedule Based MAC Protocol
Darwin Nesakumar
 
PPTX
Classification of routing protocols
Menaga Selvaraj
 
PPTX
WIRELESS TRANSMISSION
junnubabu
 
PDF
Issues in routing protocol
Pradeep Kumar TS
 
PPTX
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
PPT
Security in mobile ad hoc networks
Piyush Mittal
 
PPTX
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
PPTX
Contention based MAC protocols
Darwin Nesakumar
 
PPTX
Energy consumption of wsn
DeepaDasarathan
 
PPTX
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
PPTX
Routing Protocols in WSN
Darpan Dekivadiya
 
PPTX
wireless sensor network
DeepaDasarathan
 
PPTX
AODV routing protocol
Varsha Anandani
 
PDF
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
PPT
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
PPT
Adhoc wireless
Ipsita Sharma
 
PPTX
Handover
Manish Srivastava
 
PPTX
Adhoc wireless networks and its issues
Menaga Selvaraj
 
Security issues in manet
flowerjaan
 
Schedule Based MAC Protocol
Darwin Nesakumar
 
Classification of routing protocols
Menaga Selvaraj
 
WIRELESS TRANSMISSION
junnubabu
 
Issues in routing protocol
Pradeep Kumar TS
 
Routing protocols for ad hoc wireless networks
Divya Tiwari
 
Security in mobile ad hoc networks
Piyush Mittal
 
WSN-IEEE 802.15.4 -MAC Protocol
ArunChokkalingam
 
Contention based MAC protocols
Darwin Nesakumar
 
Energy consumption of wsn
DeepaDasarathan
 
WSN-Routing Protocols Energy Efficient Routing
ArunChokkalingam
 
Routing Protocols in WSN
Darpan Dekivadiya
 
wireless sensor network
DeepaDasarathan
 
AODV routing protocol
Varsha Anandani
 
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
CS6003 AD HOC AND SENSOR NETWORKS
Kathirvel Ayyaswamy
 
Adhoc wireless
Ipsita Sharma
 
Adhoc wireless networks and its issues
Menaga Selvaraj
 
Ad

Similar to Wormhole attack (20)

PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
PDF
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
PDF
Dj4301653656
IJERA Editor
 
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
Alexander Decker
 
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
IOSR Journals
 
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
PDF
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
pijans
 
PDF
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
IJNSA Journal
 
PPTX
Wormhole attack in Mobile Adhoc Networks
GeethaChillarge
 
PPTX
Rm presentation on research paper
Zeeshan Ahmed
 
PDF
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
PPTX
Wormhole attack in Mobile Ad hoc NetworkET.pptx
GeethaChillarge
 
PPTX
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
PDF
Injection of Attacks in MANETs
IOSR Journals
 
PDF
E0432933
IOSR Journals
 
PDF
Wormhole attack mitigation in manet a
IJCNCJournal
 
PDF
SPECTRUM SHARING FOR 6G COMMUNICATION
IRJET Journal
 
PDF
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
ijsrd.com
 
PDF
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
CRYPTOGRAPHIC HASH KEY ALGORITHM TO MITIGATE WORMHOLE ATTACKS AND LURE CATCH ...
IAEME Publication
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
ijsrd.com
 
Dj4301653656
IJERA Editor
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Alexander Decker
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
IOSR Journals
 
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
IOSR Journals
 
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
pijans
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
IJNSA Journal
 
Wormhole attack in Mobile Adhoc Networks
GeethaChillarge
 
Rm presentation on research paper
Zeeshan Ahmed
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
Wormhole attack in Mobile Ad hoc NetworkET.pptx
GeethaChillarge
 
A survey on complex wormhole attack in wireless
farrukh Farrukh
 
Injection of Attacks in MANETs
IOSR Journals
 
E0432933
IOSR Journals
 
Wormhole attack mitigation in manet a
IJCNCJournal
 
SPECTRUM SHARING FOR 6G COMMUNICATION
IRJET Journal
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
ijsrd.com
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
IJERA Editor
 
Ad

More from Harsh Kishore Mishra (13)

PDF
Intellectual Property Rights : Indian Perspective
Harsh Kishore Mishra
 
PDF
IEEE 802.11ac Standard
Harsh Kishore Mishra
 
PDF
Big Data: Issues and Challenges
Harsh Kishore Mishra
 
PPTX
Big data
Harsh Kishore Mishra
 
PPTX
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
PDF
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
PPTX
Role of MicroRNA in Phosphorus Defficiency
Harsh Kishore Mishra
 
PDF
Windows 8: inside what and how
Harsh Kishore Mishra
 
PDF
Windows 7 Versions Features
Harsh Kishore Mishra
 
PDF
Software Testing and UML Lab
Harsh Kishore Mishra
 
PPTX
Network security
Harsh Kishore Mishra
 
PPTX
Intellectual Property Rights
Harsh Kishore Mishra
 
PPTX
Windows 8 CP
Harsh Kishore Mishra
 
Intellectual Property Rights : Indian Perspective
Harsh Kishore Mishra
 
IEEE 802.11ac Standard
Harsh Kishore Mishra
 
Big Data: Issues and Challenges
Harsh Kishore Mishra
 
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Role of MicroRNA in Phosphorus Defficiency
Harsh Kishore Mishra
 
Windows 8: inside what and how
Harsh Kishore Mishra
 
Windows 7 Versions Features
Harsh Kishore Mishra
 
Software Testing and UML Lab
Harsh Kishore Mishra
 
Network security
Harsh Kishore Mishra
 
Intellectual Property Rights
Harsh Kishore Mishra
 
Windows 8 CP
Harsh Kishore Mishra
 

Recently uploaded (20)

PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
Different Generation Of Computers .pptx
divcoder9507
 
PPTX
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
PPTX
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PDF
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
AI ad its imp i military life read it ag
ShwetaBharti31
 
PDF
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
PPTX
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
APNIC
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PPT
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
PPTX
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
Different Generation Of Computers .pptx
divcoder9507
 
谢尔丹学院毕业证购买|Sheridan文凭不见了怎么办谢尔丹学院成绩单
mookxk3
 
Black Yellow Modern Minimalist Elegant Presentation.pptx
nothisispatrickduhh
 
PDF document: World Game (s) Great Redesign.pdf
Steven McGee
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
AI ad its imp i military life read it ag
ShwetaBharti31
 
UI/UX Developer Guide: Tools, Trends, and Tips for 2025
Penguin peak
 
Microsoft PowerPoint Student PPT slides.pptx
Garleys Putin
 
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
APNIC
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
1965 INDO PAK WAR which Pak will never forget.ppt
sanjaychief112
 
The Monk and the Sadhurr and the story of how
BeshoyGirgis2
 
How tech helps people in the modern era.
upadhyayaryan154
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 

Wormhole attack

  • 1. Presented By:- Harsh Kishore Mishra M.Tech. Cyber Security II Semester
  • 2. OUTLINE • Introduction • Mobile Ad-Hoc Network • Applications of MANET • Challenges and Issues • Attacks on MANET • Wormhole Attack • Past Work towards Wormhole Attack • Technique to be used • Conclusion
  • 3. INTRODUCTION • Wireless Networks are ubiquitous and provides great advantages. • Two types of wireless networks, Infrastructure and Ad Hoc • Ad Hoc networks attracts great attention. • Provides convenience, mobility, scalability, cost and Easy Setup. • Vulnerable to various attacks due to functionality and deployment scenario.
  • 4. MOBILE ADHOC NETWORK An infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources.
  • 5. MOBILE ADHOC NETWORK • A collection of wireless mobile nodes that communicate with each other without the use of any pre established network infrastructure. • It is decentralized, all network and routing activities are handled by nodes. • Wireless nodes are free to move and causes dynamic topology. • Nodes operates by co operating with each other for data. • Suitable for situations and applications where infrastructure is not possible.
  • 6. APPLICATIONS OF MANETS • Military communication and operations • Automated battlefields • Emergency services • Search and rescue operations • E-commerce: electronic payments anytime and anywhere • Business: dynamic database access, mobile offices • Personal area networks (PAN) • Networks at construction sites • Universities, Virtual classrooms and campus settings • Ad hoc communications during meetings or lectures • Multi-user games • Wireless P2P networking and Outdoor Internet access
  • 7. CHALLENGES AND ISSUES • Routing • Service and Resource Discovery • Security and Node Cooperation • Dynamic Topology • No Centralized Authority • Bandwidth Constraint • Limited Energy Source • No Predefined Boundary
  • 8. ATTACKS ON MANET • Eavesdropping • Denial of Service • Jamming • Black hole Attack • Rushing Attack • Wormhole Attack • Sinkhole Attack • Session hijacking
  • 9. WORMHOLE ATTACK • Wormhole nodes fake a route that is shorter than the original one within the network; this can confuse routing mechanisms which rely on the knowledge about distance between nodes. • It has one or more malicious nodes and a tunnel between them. • The attacking node captures the packets from one location and transmits them to other distant located node which distributes them locally. • A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes or cryptographic mechanisms.
  • 10. WORMHOLE ATTACK The tunnel is either the wired link or a high frequency links. This creates the illusion that the two end points of the tunnel are very close to each other.
  • 11. ATTACK MEDIUM In Band Attack Out of Band Attack
  • 12. ATTACKING MODES Wormhole Attack Modes Hidden Modes Packet Encapsulation Packet Replay Participation Modes High Power Transmission Out of Band
  • 13. • 1) Packet Encapsulation: Each packet is routed via the legitimate path only, when received by the wormhole end, gets encapsulated to prevent nodes on way from incrementing hop counts. The packet is brought into original form by the second end point. • 2) Out-of-Band: This two-ended wormhole, a dedicated out-of-band high bandwidth channel is placed between end points to create a wormhole link. • 3) High-Power-Transmission: This kind of wormhole approach has only one malicious node with much high transmission capability that attracts the packets to follow path passing from it. • 4) Packet Relay: In packet relay two malicious nodes relay packet between two nodes which are far apart from each other and convenience these nodes that they are neighbor.
  • 14. EFFECTS OF THE ATTACK • Selectively drop data packets • Routing disruption • Traffic analysis for information leaking. • Bypasses and attracts a large amount of network traffic • Collect and manipulate network traffic like modifying packets, changing the sequence of packets, and etc. • By analyzing collected network data, the attacker can perform many other more aggressive attacks, such as man-in-the-middle attacks, cipher breaking, protocol reverse engineering etc.
  • 15. EXISTING SOLUTIONS TOWARDS WORMHOLE ATTACKS • Concept of geographical and temporal packet leashes • Directional Antenna • Connectivity Based Approach • Transmission Time Based Mechanism • LITEWORP and MOBIWORP • Digital Signature based Approach • Diffusion of Innovation theory based Approach • Protocol Specific Solutions • SAM (Statistical Analysis of Multipath) • Graphical and Topological Information based Approaches
  • 16. Method Requirements Comments Packet Leaches Geographical and Temporal Loosely synchronized clocks Straightforward solution but has general limitations of GPS technology Directional Antennas Nodes use specific ‘sectors’ of their antennas to communicate with each other It is not directly applicable to other networks Connectivity based approaches connectivity information and need tightly synchronized clocks Requirements are not realistic MOBIWORP and LITEWORP Loosely synchronized clocks and Central Authority Applicable to static network Digital Signature based Nodes should know each other’s Digital Signature Computation time
  • 17. Method Requirements Comments Diffusion of Innovation Based Nodes confirmation End to end delay is increased Transmission Time based Calculation of RTT between nodes Accuracy of RTT Protocol Specific Modification in Protocols Works for specific protocols SAM Statistically calculation of relative frequency of path Non Multi hop path protocol not supported Graphical and topological based Miscellaneous Protocol specific, limitations
  • 18. TECHNIQUE TO BE USED • Introduced by Dong et al., named as WormPlaner • Based on the planarity of graph, which is drawn based on the connectivity information. • No Special hardware or synchronization needed. • WormPlanar exploits location free network planarization technique to perform connectivity based wormhole detection to detect symptoms of attack.
  • 19. WORMPLANER • A connected planarization topology is extracted from normal Network Graph. • Planarization algorithm will fail in case of wormhole attack, so planarity can be validated to confirm worm hole attack. • WormPlaner Protocol has two stages, Local Planarity Test and Refinement process. • Local planarity test is applied on each node to collect k-hop neighbors information. • Then Planarization algorithm will be applied on each node’s neighborhood sub graph. • Nodes, failing planarity test will be suspected node and further refinement process will be applied to detect sure wormhole nodes. • Further, Refinement Process is applied to eliminate false positives.
  • 20. WORMPLANER Advantages • Foolproof Solution • Detects all malicious nodes • No False positives Limitation • Merely detection is possible, no avoidance solution
  • 22. REFERENCES • Aarti, S. S. T. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5). • de Graaf, R., Hegazy, I., Horton, J., & Safavi-Naini, R. (2010). Distributed detection of wormhole attacks in wireless sensor networks Ad Hoc Networks (pp. 208-223): Springer. • Dong, D., Li, Z., Liu, Y., & Liao, X. (2009). Wormcircle: Connectivity-based wormhole detection in wireless ad hoc and sensor networks. Paper presented at the Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on. • Dong, D., Liao, X., Liu, Y., Li, X.-Y., & Pang, Z. (2013). Fine-grained location-free planarization in wireless sensor networks. Mobile Computing, IEEE Transactions on, 12(5), 971-983. • HAOYANG, H., FANYE, SONGWULU, ANDLIXIA ZHANG,. (2004). Security in mobile ad hoc networks: Challenges and solutions UCLA Previously Published Works. • Hu, L., & Evans, D. (2004). Using Directional Antennas to Prevent Wormhole Attacks. Paper presented at the NDSS. • Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370-380. • Jeroen Hoebeke, I. M., Bart Dhoedt and Piet Demeester. An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  • 23. REFERENCES • Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 6(3), 344-362. • Khan, Z. A., & Islam, M. H. (2012, 8-9 Oct. 2012). Wormhole attack: A new detection technique. Paper presented at the Emerging Technologies (ICET), 2012 International Conference on. • Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. Paper presented at the Wireless Communications and Networking Conference, 2005 IEEE. • Özdemir, S., Meghdadi, M., & Güler, Ý. (2008). A time and trust based wormhole detection algorithm for wireless sensor networks. Paper presented at the manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC’08). • Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(3), 634-660. • Priyanka Goyal, V. P., Rahul Rishi. (2011). MANET: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of Computational Engineering & Management, 11. • Qian, L., Song, N., & Li, X. (2007). Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach. Journal of Network and Computer Applications, 30(1), 308-330. • Rashid Sheikhl Mahakal Singh Chandee, D. K. M. (2010). Security Issues in MANET: A Review IEEE. • Saurabh Upadhyaya, B. K. C. (2011). Impact of Wormhole Attacks on MANETs. International Journal of Computer Science & Emerging Technologies, 2(1).
  • 24. REFERENCES • Shams Qazi, R. R., Yi Mu, Willy Susilo. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications. • Tran Van Phuong, N. T. C., Young-Koo Lee, Sungyoung Lee, Heejo Lee. (2007). Transmission Time-based Mechanism to Detect Wormhole Attacks Paper presented at the Asia-Pacific Services Computing Conference. • Vani, A., & Rao, D. S. (2011). A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks. International Journal on Computer Science and Engineering (IJCSE), 3(6), 2377-2384. • Venkataraman, R., Pushpalatha, M., Rao, T. R., & Khemka, R. (2009). A graphtheoretic algorithm for detection of multiple wormhole attacks in mobile ad hoc networks. International Journal of Recent Trends in Engineering (IJRTE), 1(2), 220-222. • Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6(4), 483-503. • Xiaopei, L., Dezun, D., & Xiangke, L. (2013, 1-4 Oct. 2013). WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks. Paper presented at the Parallel Processing (ICPP), 2013 42nd International Conference on. • Xiaopei Lu, D. D., Xiangke Liao. (2013). WormPlanar: Topological Planarization based Wormhole Detection in WirelessNetworks. Paper presented at the 42nd International Conference on Parallel Processing.