13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

144 J. Zhen and S. Sr<strong>in</strong>ivasFig. 2. Wormhole Attackcommunicate with nodes near B, they will also choose this route pass<strong>in</strong>g M1-M2.Then M1 and M2 can drop, delay or modify packets <strong>in</strong> transit.One severe problem is that perform<strong>in</strong>g both k<strong>in</strong>d of attacks does not even requireattackers to have legitimate keys <strong>in</strong> the network s<strong>in</strong>ce only packet record<strong>in</strong>g,replay and MAC spoof<strong>in</strong>g are needed and these can easily be achieved withoutidentification.3 Related WorkThere have been many proposals for secur<strong>in</strong>g rout<strong>in</strong>g protocols <strong>in</strong> MANET’s.Marti et. al. [8] propose a “watch-dog” mechanism <strong>by</strong> implement<strong>in</strong>g an overhear<strong>in</strong>gmodule at each node to check if the forward<strong>in</strong>g of the packet at the nextnode has been changed illegitimately. Zapata and Asokan [3][4] present a secureextension to the AODV protocol to protect packets from malicious modification.Papadimitratos and Haas [5][9] propose the Secure Rout<strong>in</strong>g Protocol (SRP) toset up a secure association between two nodes, and a secure l<strong>in</strong>k state rout<strong>in</strong>galgorithm. Hu et. al. [6]propose SEAD (Secure Efficient Ad Hoc Distance VectorRout<strong>in</strong>g) to secure the algorithm us<strong>in</strong>g a one-way hash cha<strong>in</strong>. In [10], Yi et. al.def<strong>in</strong>e security levels for each node to avoid rout<strong>in</strong>g through un-trusted nodes.In [12] <strong>by</strong> Dahill et. al., packets are signed hop-<strong>by</strong>-hop us<strong>in</strong>g PKI (AuthenticatedRout<strong>in</strong>g for Ad Hoc Networks-ARAN). Other approaches are proposedto enhance co-operations among nodes <strong>in</strong> [13] <strong>by</strong> Buttyan and Hubauz and [14]<strong>by</strong> Buchegger and Boudec. Hu et. al. [7] propose Ariadne, a new secure rout<strong>in</strong>gprotocol.Hu et. al. [16] def<strong>in</strong>e the wormhole attack and propose a solution us<strong>in</strong>g packetleashes. Their solution needs extra hardware to provide geographic <strong>in</strong>formationand all nodes <strong>in</strong> the network need their clocks to be synchronized. Also, it needsaccurate prediction of packet send<strong>in</strong>g time and receiv<strong>in</strong>g time. These requirementsare not feasible for current common-used hardware and software.Multi-path rout<strong>in</strong>g protocols <strong>in</strong> which multiple paths are returned <strong>in</strong> eachroute discovery can reduce the impact of the wormhole attack because the traffic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!