Abstract

Due to recent advances in wireless communication technologies, mobile ad hoc networks (MANETs) have become the networks of choice for use in various applications. Unfortunately, this advantage comes with serious security concerns, particularly from a wireless channel prospective, where MANETs may be vulnerable to collaborative wormhole attacks, in particular, packet dropping and message tampering attacks. Recently, two secured routing protocols against these types of attacks (the so-called Highly Secured Approach Method or HSAM and the so-called Securing AODV against Wormhole Attacks in emergency MANET Multimedia Communications or AODV-WADR-AES) were proposed. These schemes are investigated in-depth to identify their weaknesses and a novel secured routing scheme (so-called Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs or TSMI) is proposed, with the goal to mitigate collaborative wormhole attacks in MANETs while maintaining the performance levels of both the HSAM and AODVWADR- AES schemes. Simulation results are presented to validate the stated goal using various performance metrics.

Highlights

  • The consensus among the research community involved is that wormhole attacks aim to attack a fragile mobile ad hoc networks (MANETs) by using two or more malicious nodes to fool a source node which is trying to send data

  • AODV-WADR-Advanced Encryption Standard (AES) does not protect the data packets during data transmission. In light of these shortcomings, we propose a new method called A Timed and Secure Monitoring Implementation against Wormhole Attacks in MANETs that benefits from the features of both E-Highly Secure Approach Method (HSAM) and AODV-WADR-AES to address some of their weaknesses

  • The experiments performed by Wang and Hu [4] revealed that Triple Data Encryption Standard (TDES) was up to approximately three times slower than AES, which concurs with our observations

Read more

Summary

Introduction

Mobile devices such as laptops and cellular phones are capable of sending data to each other on demand. The consensus among the research community involved is that wormhole attacks aim to attack a fragile MANET by using two or more malicious nodes to fool a source node which is trying to send data. This is done by using a route which presents itself as the shortest route to the destination node [3]. A common wormhole attack involves a node which is used to record data and another node which is used to forward data back into the network [4]. Wormhole attacks aim to attack a fragile MANET by using two or more malicious nodes to fool a source node, which is trying to send the data. Unlike behaving nodes, X and Y have a higher transmission power which gives them the ability to attract traffic to themselves, allowing malicious acts to take place

Objectives
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.