WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS
#1

Presented by:
VICTOR O. OBADO

[attachment=11134]
Abstract
A wireless ad hoc sensor network consists of a collection of wireless sensor nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. Sensor nodes are typically distinguished by their limited power, processing and memory resources. However, routing in these networks faces a number of security threats. One such threat is the wormhole attack. In this attack, a malicious node captures packets from one location and “tunnels” these packets to the other malicious node, which is assumed to be located at some distance. The second malicious node is then expected to replay the “tunneled” packets locally. This attack can take place using either in-band (tunneling) or out-of-band communication to transfer the packets between these locations. This can give nodes that are in the neighborhood of the attackers the impression that links exist between them and other nodes that are in reality far outside of transmission range. Moreover it is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. The wormhole attack can therefore form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. This research aims at developing a detection algorithm based on a localization approach that enables us to visualize the distortions caused by the attack. The distortions, which are caused by the fake connections through the wormhole, bend the constructed network to pull the sensors that are far apart to each other. Through detecting this bending feature, the wormhole
is located and the fake connections are identified, hence eliminating it, while trying to minimize energy consumption and the computational overheads
CHAPTER 1: INTRODUCTION
Project Background

The application of routing techniques in wireless ad hoc sensor networks allows diminishing the effect of unreliable wireless links and the changing network topology. This inefficiency can be avoided by having multiple paths available and a new route discovery is needed only when all paths break. But unlike in wired networks where the physical wires prevent an attack, the sensor networks are threatened due to the open nature of wireless communication and the rapid nature of deployment of nodes. The wormhole attack is one such threat and it puts severe threats to both the ad hoc routing protocols and some security enhancements. In many routing protocols, mobile nodes depend on the neighbourhood discovery procedure to construct the local network topology. If the attackers tunnel the neighbour discovery packets through wormholes, the good nodes may get false information about their neighbours i.e. this can give a node the impression that it is the neighbor of a node that is far away. This may lead to the choice of a non-existent route. Attackers may also be able to manipulate nodes to send traffic through them, where the attackers can drop, modify or record such traffic.
CHAPTER 2: PROJECT IDENTIFICATION
Problem statement

A wormhole attack is a particularly severe attack on ad hoc network routing where two attackers connected by a high speed off-channel page link called the wormhole link. The wormhole page link can be established by using a network cable and any form of “wired” page link technology. The end-point of this page link (wormhole nodes) is equipped with radio transceivers compatible with the ad hoc network to be attacked. Once the wormhole page link is established, the adversary record the wireless data they overhear, forward it to each other, and replay the packets through the wormhole page link at the other end of the network. Replaying valid network messages at improper places, wormhole attackers can make far apart nodes believe they are immediate neighbors, and force all communications between affected nodes to go through them. A wormhole attack is hence dangerous for the existing ad hoc routing protocols.
Sub problems
• Localisation of nodes in a wireless ad hoc sensor network.
• Reconstructing the network with wormhole attack present.
• Visualizing the distortions caused by the presence of the attack in the network.
• Through detecting the bending feature of the distorted network, the wormhole is located and the fake connections identified and eliminated.
Delimitations of study
• Our study will be limited to research in the network layer security threats more specifically the wormhole attack.
• Our proposed detection mechanism will be limited to a visualization approach through sensor nodes localisation to carry out its process of detection, without using any specialized hardware.
Objective of the study
The objective of this research is to localize sensor nodes, first in the absence of the wormhole attack and with the attack present, in a manner that minimizes energy consumption and computational overheads, and without the use of a specialized hardware.
We then examine the distortions introduced by the wormhole page link to enable us locate the fake connections. The performance of ad hoc routing under the wormhole attack is also examined. Note that all the schemes for detection and prevention of routing attacks and security enhancement in single-path routing need to change routing protocols and/or add additional security services or systems in the network. This mechanism should be designed in such a way that it doesn’t introduce computation overhead without hurting the detection capability.
Significance of the study
An efficient nodes localisation based detection mechanism of the wormhole attack will result in improved reliability in communication by improving routing services, in addition to improving location based services associated with sensor networks such as target tracking, disaster relief etc. since the threats introduced by the colluding wormhole nodes such as the wrong impression of distance and packets being dropped or modified is eliminated and any other related network layer security threat is also put at bay.
Research methodology
• A review of the previous wormhole attack detection methods will be carried out, followed by system modeling.
• A further review of nodes’ localization mechanisms will also be carried out.
• Localization of the nodes in a sensor network in the absence of the attack.
• Localization of the nodes in the presence of the attack.
• Visualization of the distortions caused by the fake connections through the wormhole.
• Through detecting the network layout distortions, the wormhole is located and the fake connections identified.
• A comparative study will also be conducted with regards to the existing routing protocols.
Reply
#2
hi
i want to add wormhole attack in ns-2 but not know how to add it.
if you have code form wormhole attack please help me
thnks
Reply
#3
To get full information or details of WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS please have a look on the pages

http://studentbank.in/report-wormhole-at...r-networks

if you again feel trouble on WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS please reply in that page and ask specific fields
Reply
#4
hi Everyone,
Iwant to implement a wormhole attack (using encapsulation) in NS2 with AODV procotol.
please I need your help
Reply
#5
cross layer schemes for reducing delay in wireless networks ns2 project
Reply
#6
To get full information or details of WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS please have a look on the pages





http://studentbank.in/report-wormhole-at...r-networks





if you again feel trouble on WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS please reply in that page and ask specific fields in WORMHOLE ATTACK DETECTION IN WIRELESS ADHOC SENSOR NETWORKS

Reply
#7
(28-03-2011, 10:53 AM)seminar class Wrote: Presented by:
VICTOR O. OBADO


Abstract
A wireless ad hoc sensor network consists of a collection of wireless sensor nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. Sensor nodes are typically distinguished by their limited power, processing and memory resources. However, routing in these networks faces a number of security threats. One such threat is the wormhole attack. In this attack, a malicious node captures packets from one location and “tunnels” these packets to the other malicious node, which is assumed to be located at some distance. The second malicious node is then expected to replay the “tunneled” packets locally. This attack can take place using either in-band (tunneling) or out-of-band communication to transfer the packets between these locations. This can give nodes that are in the neighborhood of the attackers the impression that links exist between them and other nodes that are in reality far outside of transmission range. Moreover it is possible even if the attacker has not compromised any hosts, and even if all communication provides authenticity and confidentiality. The wormhole attack can therefore form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. For example, most existing ad hoc network routing protocols, without some mechanism to defend against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. This research aims at developing a detection algorithm based on a localization approach that enables us to visualize the distortions caused by the attack. The distortions, which are caused by the fake connections through the wormhole, bend the constructed network to pull the sensors that are far apart to each other. Through detecting this bending feature, the wormhole
is located and the fake connections are identified, hence eliminating it, while trying to minimize energy consumption and the computational overheads
CHAPTER 1: INTRODUCTION
Project Background

The application of routing techniques in wireless ad hoc sensor networks allows diminishing the effect of unreliable wireless links and the changing network topology. This inefficiency can be avoided by having multiple paths available and a new route discovery is needed only when all paths break. But unlike in wired networks where the physical wires prevent an attack, the sensor networks are threatened due to the open nature of wireless communication and the rapid nature of deployment of nodes. The wormhole attack is one such threat and it puts severe threats to both the ad hoc routing protocols and some security enhancements. In many routing protocols, mobile nodes depend on the neighbourhood discovery procedure to construct the local network topology. If the attackers tunnel the neighbour discovery packets through wormholes, the good nodes may get false information about their neighbours i.e. this can give a node the impression that it is the neighbor of a node that is far away. This may lead to the choice of a non-existent route. Attackers may also be able to manipulate nodes to send traffic through them, where the attackers can drop, modify or record such traffic.
CHAPTER 2: PROJECT IDENTIFICATION
Problem statement

A wormhole attack is a particularly severe attack on ad hoc network routing where two attackers connected by a high speed off-channel page link called the wormhole link. The wormhole page link can be established by using a network cable and any form of “wired” page link technology. The end-point of this page link (wormhole nodes) is equipped with radio transceivers compatible with the ad hoc network to be attacked. Once the wormhole page link is established, the adversary record the wireless data they overhear, forward it to each other, and replay the packets through the wormhole page link at the other end of the network. Replaying valid network messages at improper places, wormhole attackers can make far apart nodes believe they are immediate neighbors, and force all communications between affected nodes to go through them. A wormhole attack is hence dangerous for the existing ad hoc routing protocols.
Sub problems
• Localisation of nodes in a wireless ad hoc sensor network.
• Reconstructing the network with wormhole attack present.
• Visualizing the distortions caused by the presence of the attack in the network.
• Through detecting the bending feature of the distorted network, the wormhole is located and the fake connections identified and eliminated.
Delimitations of study
• Our study will be limited to research in the network layer security threats more specifically the wormhole attack.
• Our proposed detection mechanism will be limited to a visualization approach through sensor nodes localisation to carry out its process of detection, without using any specialized hardware.
Objective of the study
The objective of this research is to localize sensor nodes, first in the absence of the wormhole attack and with the attack present, in a manner that minimizes energy consumption and computational overheads, and without the use of a specialized hardware.
We then examine the distortions introduced by the wormhole page link to enable us locate the fake connections. The performance of ad hoc routing under the wormhole attack is also examined. Note that all the schemes for detection and prevention of routing attacks and security enhancement in single-path routing need to change routing protocols and/or add additional security services or systems in the network. This mechanism should be designed in such a way that it doesn’t introduce computation overhead without hurting the detection capability.
Significance of the study
An efficient nodes localisation based detection mechanism of the wormhole attack will result in improved reliability in communication by improving routing services, in addition to improving location based services associated with sensor networks such as target tracking, disaster relief etc. since the threats introduced by the colluding wormhole nodes such as the wrong impression of distance and packets being dropped or modified is eliminated and any other related network layer security threat is also put at bay.
Research methodology
• A review of the previous wormhole attack detection methods will be carried out, followed by system modeling.
• A further review of nodes’ localization mechanisms will also be carried out.
• Localization of the nodes in a sensor network in the absence of the attack.
• Localization of the nodes in the presence of the attack.
• Visualization of the distortions caused by the fake connections through the wormhole.
• Through detecting the network layout distortions, the wormhole is located and the fake connections identified.
• A comparative study will also be conducted with regards to the existing routing protocols.
Reply
#8

Detecting Wormhole Attacks in Wireless Sensor Networks

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless page link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, the algorithm uses a hop counting technique as a probe procedure, reconstructs local maps for each node, and then uses a “diameter” feature to detect abnormalities caused by wormholes. The main advantage of the algorithm is that it provides the locations of wormholes, which is useful for implementing countermeasures. Simulation results show that the algorithm has low false detection and false toleration rates.
Keywords: Wireless sensor networks, wormhole detection, distributed algorithm

Unique characteristics like limited bandwidth, limited battery power and dynamic topology makes Wireless sensor network (WSN) vulnerable to many kinds of attacks. Therefore interest in research of security in WSN has been increasing since last several years. Infrastructure less and self-governing nature of WSN is challenging issue in terms of security. Wormhole attack is one of the severe attack in wireless sensor network. In this paper, the techniques dealing with wormhole attack in WSN are surveyed and a method is proposed for detection and prevention of wormhole attack. AOMDV (Ad hoc On demand Multipath Distance Vector) routing protocol is incorporated into these method which is based on RTT (Round Trip Time) mechanism and other characteristics of wormhole attack. As compared to other solution shown in literature, proposed approach looks very promising. NS2 simulator is used to perform all simulation.

Introduction
Sensor nodes are used to perform communication in wireless sensor network. Nodes in network here communicate
directly with each other using wireless transceivers with no fixed infrastructure. Sensor nodes are deployed in large
number to monitor the environment or system by measurement of physical parameters such as pressure,
characteristic of object temperature and their relative humidity or motion. Each node of the sensor network consist
of the three subsystems: the processing subsystem which performs local computations on the sensed data, the sensor
subsystem which senses the environment and the communication subsystem which is responsible for message
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: wormhole attack projects in ns 2, ppt data flooding attack in mobile adhoc network, wormhole source program for ns2, wormhole attack in wireless sensor network ppt, wormhole attack, ppt of detection and prevention of wormhole attack, seminar report on wormhole attack in manet,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Military combat robot wireless controlled. Camera helps keeping an eye on border. seminar class 6 10,980 09-06-2017, 10:27 AM
Last Post: jaseela123d
  AUTOMATIC STREET LIGHT CONTROL WITH SENSOR TECHNOLOGY seminar class 2 11,351 22-05-2017, 11:07 AM
Last Post: yasminoth93
  ULTRASONIC TECHNIQUES FOR HIDDEN CORROSION DETECTION IN AIRCRAFT WING SKIN smart paper boy 2 3,028 13-04-2017, 03:53 PM
Last Post: jaseela123d
  Wireless Communication – ZigBee / Bluetooth / RF / IR based major projects for ECE project topics 9 18,889 16-07-2016, 03:45 PM
Last Post: jaseela123d
  Wireless based Automatic dam water level control shutter open /closed with emergency smart paper boy 4 11,052 11-09-2015, 02:00 PM
Last Post: seminar report asees
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,006 01-08-2015, 02:53 PM
Last Post: seminar report asees
  Multiuser SMS Based Wireless Electronic Notice Board seminar class 4 5,743 20-05-2015, 01:33 PM
Last Post: seminar report asees
  Measuring the Performance of IEEE 802.11p Using ns-2 Simulator for Vehicular Networks smart paper boy 3 2,511 07-10-2014, 06:34 PM
Last Post: seminar report asees
  wireless charging of mobile phones using microwaves ramki86 33 21,191 05-08-2014, 09:29 PM
Last Post: seminar report asees
  SMS Based Wireless Electronic Notice Board using GSM/CDMA/3G Mobile Phone seminar class 20 18,046 30-04-2014, 10:43 PM
Last Post: ShawnHasson

Forum Jump: