13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

144 J. Zhen and S. Sr<strong>in</strong>ivasFig. 2. Wormhole Attackcommunicate with nodes near B, they will also choose this route pass<strong>in</strong>g M1-M2.Then M1 and M2 can drop, delay or modify packets <strong>in</strong> transit.One severe problem is that perform<strong>in</strong>g both k<strong>in</strong>d of attacks does not even requireattackers to have legitimate keys <strong>in</strong> the network s<strong>in</strong>ce only packet record<strong>in</strong>g,replay and MAC spoof<strong>in</strong>g are needed and these can easily be achieved withoutidentification.3 Related WorkThere have been many proposals for secur<strong>in</strong>g rout<strong>in</strong>g protocols <strong>in</strong> MANET’s.Marti et. al. [8] propose a “watch-dog” mechanism <strong>by</strong> implement<strong>in</strong>g an overhear<strong>in</strong>gmodule at each node to check if the forward<strong>in</strong>g of the packet at the nextnode has been changed illegitimately. Zapata and Asokan [3][4] present a secureextension to the AODV protocol to protect packets from malicious modification.Papadimitratos and Haas [5][9] propose the Secure Rout<strong>in</strong>g Protocol (SRP) toset up a secure association between two nodes, and a secure l<strong>in</strong>k state rout<strong>in</strong>galgorithm. Hu et. al. [6]propose SEAD (Secure Efficient Ad Hoc Distance VectorRout<strong>in</strong>g) to secure the algorithm us<strong>in</strong>g a one-way hash cha<strong>in</strong>. In [10], Yi et. al.def<strong>in</strong>e security levels for each node to avoid rout<strong>in</strong>g through un-trusted nodes.In [12] <strong>by</strong> Dahill et. al., packets are signed hop-<strong>by</strong>-hop us<strong>in</strong>g PKI (AuthenticatedRout<strong>in</strong>g for Ad Hoc Networks-ARAN). Other approaches are proposedto enhance co-operations among nodes <strong>in</strong> [13] <strong>by</strong> Buttyan and Hubauz and [14]<strong>by</strong> Buchegger and Boudec. Hu et. al. [7] propose Ariadne, a new secure rout<strong>in</strong>gprotocol.Hu et. al. [16] def<strong>in</strong>e the wormhole attack and propose a solution us<strong>in</strong>g packetleashes. Their solution needs extra hardware to provide geographic <strong>in</strong>formationand all nodes <strong>in</strong> the network need their clocks to be synchronized. Also, it needsaccurate prediction of packet send<strong>in</strong>g time and receiv<strong>in</strong>g time. These requirementsare not feasible for current common-used hardware and software.Multi-path rout<strong>in</strong>g protocols <strong>in</strong> which multiple paths are returned <strong>in</strong> eachroute discovery can reduce the impact of the wormhole attack because the traffic

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!