Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks
#1

Detecting and Locating Wormhole Attacks in Wireless Ad Hoc Networks

[attachment=17328]
Abstract:
Wireless communications offer organizations and users many benefits, such as portability, flexibility, increased productivity, and lower installation costs. Wireless technologies cover a broad range of differing capabilities oriented toward different uses and needs. Wireless local area network (WLAN) devices. Ad hoc networks, such as those enabled by Bluetooth, allow data synchronization with network systems and application sharing between devices.


Introduction to Wormhole attack:
In a wormhole attack, an attacker receives packets at one point in the network,
“tunnels” them to another point in the network, and then replays them into the network from that point. For tunneled distances longer than the normal wireless transmission range of a single hop, it is simple for the attacker to make the tunneled packet arrive with better metric than a normal multihop route, for example, through use of a single long-range directional wireless page link or through a direct wired page link to a colluding attacker. It is also possible for the attacker to forward each bit over the wormhole directly, without waiting for an entire packet to be received before beginning to tunnel the bits of the packet, in order to minimize delay introduced by the wormhole. Due to the nature of wireless transmission, the attacker can create a wormhole even for packets not addressed to it self, since it can overhear them in wireless transmission and tunnel them to the colluding attacker at the opposite end of the wormhole. If the attacker performs this tunneling honestly and reliably, no harm is done; the attacker actually provides a useful service in connecting the network more efficiently. However, the wormhole puts the attacker in a very powerful position relative to other nodes in the network, and the attacker could exploit this position in a variety of ways. The attack can also still be performed even if the network communication provides confidentiality and authenticity, and even if the attacker has no cryptographic keys. Furthermore, the attacker is invisible at higher layers; unlike a malicious node in a routing protocol, which can often easily be named, the presence of the wormhole and the two colluding attackers at either endpoint of the wormhole are not visible in the route. The wormhole attack is particularly dangerous against many ad hoc network routing protocols in which the nodes that hear a packet transmission directly from some node consider themselves to be in range of (and, thus a neighbor of) that node.



Geographical Leashes:
To construct a geographical leash, in general, each node must know its own location, and all nodes must have loosely synchronized clocks. When sending a packet, the sending node includes in the packet its own location Ps and the time at which it sent the packet ts; when receiving a packet , the receiving node compares these values to its own location Pr , and the time at which it received the packet tr . If the clocks of the sender and receiver are synchronized to within ±Δ, and v is an upper bound on the velocity of any node, then the receiver can compute an upper bound on the distance between the sender and itself dsr.


TIK (TESLA with instant) Protocol description: Our TIK protocol implements temporal leashes and provides efficient instant authentication for broadcast communication in wireless networks. TIK stands for TESLA with instant key disclosure, and is an extension of the TESLA broadcast authentication protocol [9]. The intuition behind TIK is that the packet transmission time can be significantly longer than the time synchronization error. In these cases, the receiver can verify the TESLA security condition (that the corresponding key has not yet been disclosed) as it receives the packet (explained below); this fact allows the sender to disclose the key in the same packet, thus motivating the protocol name “TESLA with instant key disclosure.”
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: locating friends and family using gps, fault locating in under grounded and high resistance grounded system, footprint detecting sybil attacks in urban vehicular networks ppt, fault locating in undergrounded and high resistance grounded system, locating equivalent servants over p2p networks via ppt, wormhole, fault locating in undergrounded and high resistance grounded systems seminar topic pdf,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Wireless LAN Security FULL REPORT seminar details 3 5,130 06-11-2014, 09:23 PM
Last Post: seminar report asees
  Adaptive Data Fusion for Energy Efficient Routing in Wireless Sensor Networksy seminar addict 1 1,502 25-08-2014, 05:40 PM
Last Post: Guest
  Mobile Ad Hoc Networks project uploader 1 1,751 20-12-2012, 12:31 PM
Last Post: seminar details
  Sniffer for Detecting Lost Mobiles project uploader 1 1,192 30-11-2012, 12:56 PM
Last Post: seminar details
  3G WIRELESS TECHNOLOGY:- project uploader 1 1,655 27-11-2012, 01:03 PM
Last Post: seminar details
  WIRELESS TECHNOLOGY project uploader 1 1,500 27-11-2012, 01:03 PM
Last Post: seminar details
  Current generation moves into wireless technology project uploader 1 1,664 27-11-2012, 01:03 PM
Last Post: seminar details
  WIRELESS POWER TRANSMISSION project uploader 1 1,700 22-11-2012, 01:34 PM
Last Post: seminar details
  WIRELESS SWITCH project uploader 1 1,412 12-11-2012, 04:07 PM
Last Post: seminar details
  WiMAX: Broadband Wireless Access project uploader 1 1,045 02-11-2012, 04:10 PM
Last Post: seminar details

Forum Jump: