SlideShare a Scribd company logo
1 of 24
Download to read offline
Presented By:-
Harsh Kishore Mishra
M.Tech. Cyber Security II Semester
OUTLINE
• Introduction
• Mobile Ad-Hoc Network
• Applications of MANET
• Challenges and Issues
• Attacks on MANET
• Wormhole Attack
• Past Work towards Wormhole Attack
• Technique to be used
• Conclusion
INTRODUCTION
• Wireless Networks are ubiquitous and provides great
advantages.
• Two types of wireless networks, Infrastructure and Ad Hoc
• Ad Hoc networks attracts great attention.
• Provides convenience, mobility, scalability, cost and Easy
Setup.
• Vulnerable to various attacks due to functionality and
deployment scenario.
MOBILE ADHOC NETWORK
An infrastructure less collection of mobile nodes that can arbitrarily change their
geographic locations such that these networks have dynamic topologies and random
mobility with constrained resources.
MOBILE ADHOC NETWORK
• A collection of wireless mobile nodes that communicate with each
other without the use of any pre established network infrastructure.
• It is decentralized, all network and routing activities are handled by
nodes.
• Wireless nodes are free to move and causes dynamic topology.
• Nodes operates by co operating with each other for data.
• Suitable for situations and applications where infrastructure is not
possible.
APPLICATIONS OF MANETS
• Military communication and operations
• Automated battlefields
• Emergency services
• Search and rescue operations
• E-commerce: electronic payments
anytime and anywhere
• Business: dynamic database access,
mobile offices
• Personal area networks (PAN)
• Networks at construction sites
• Universities, Virtual classrooms and
campus settings
• Ad hoc communications during
meetings or lectures
• Multi-user games
• Wireless P2P networking and Outdoor
Internet access
CHALLENGES AND ISSUES
• Routing
• Service and Resource Discovery
• Security and Node Cooperation
• Dynamic Topology
• No Centralized Authority
• Bandwidth Constraint
• Limited Energy Source
• No Predefined Boundary
ATTACKS ON MANET
• Eavesdropping
• Denial of Service
• Jamming
• Black hole Attack
• Rushing Attack
• Wormhole Attack
• Sinkhole Attack
• Session hijacking
WORMHOLE ATTACK
• Wormhole nodes fake a route that is shorter than the original one
within the network; this can confuse routing mechanisms which rely
on the knowledge about distance between nodes.
• It has one or more malicious nodes and a tunnel between them.
• The attacking node captures the packets from one location and
transmits them to other distant located node which distributes them
locally.
• A wormhole attack can easily be launched by the attacker without
having knowledge of the network or compromising any legitimate
nodes or cryptographic mechanisms.
WORMHOLE ATTACK
The tunnel is either the wired link or a high frequency links. This
creates the illusion that the two end points of the tunnel are very close
to each other.
ATTACK MEDIUM
In Band Attack Out of Band Attack
ATTACKING MODES
Wormhole Attack
Modes
Hidden Modes
Packet
Encapsulation
Packet Replay
Participation
Modes
High Power
Transmission
Out of Band
• 1) Packet Encapsulation: Each packet is routed via the legitimate path
only, when received by the wormhole end, gets encapsulated to prevent
nodes on way from incrementing hop counts. The packet is brought into
original form by the second end point.
• 2) Out-of-Band: This two-ended wormhole, a dedicated out-of-band high
bandwidth channel is placed between end points to create a wormhole link.
• 3) High-Power-Transmission: This kind of wormhole approach has only
one malicious node with much high transmission capability that attracts
the packets to follow path passing from it.
• 4) Packet Relay: In packet relay two malicious nodes relay packet
between two nodes which are far apart from each other and
convenience these nodes that they are neighbor.
EFFECTS OF THE ATTACK
• Selectively drop data packets
• Routing disruption
• Traffic analysis for information leaking.
• Bypasses and attracts a large amount of network traffic
• Collect and manipulate network traffic like modifying packets,
changing the sequence of packets, and etc.
• By analyzing collected network data, the attacker can perform many
other more aggressive attacks, such as man-in-the-middle attacks,
cipher breaking, protocol reverse engineering etc.
EXISTING SOLUTIONS TOWARDS
WORMHOLE ATTACKS
• Concept of geographical and temporal packet leashes
• Directional Antenna
• Connectivity Based Approach
• Transmission Time Based Mechanism
• LITEWORP and MOBIWORP
• Digital Signature based Approach
• Diffusion of Innovation theory based Approach
• Protocol Specific Solutions
• SAM (Statistical Analysis of Multipath)
• Graphical and Topological Information based Approaches
Method Requirements Comments
Packet Leaches Geographical
and Temporal
Loosely synchronized clocks
Straightforward solution but
has general limitations of GPS
technology
Directional Antennas
Nodes use specific ‘sectors’ of
their antennas to
communicate
with each other
It is not directly applicable to
other networks
Connectivity based
approaches
connectivity information and
need tightly synchronized
clocks
Requirements are not realistic
MOBIWORP and LITEWORP
Loosely synchronized clocks
and Central Authority
Applicable to static network
Digital Signature based
Nodes should know each
other’s Digital Signature
Computation time
Method Requirements Comments
Diffusion of Innovation Based Nodes confirmation
End to end delay is increased
Transmission Time based
Calculation of RTT between
nodes
Accuracy of RTT
Protocol Specific Modification in Protocols Works for specific protocols
SAM
Statistically calculation of
relative frequency of path
Non Multi hop path protocol
not supported
Graphical and topological
based
Miscellaneous Protocol specific, limitations
TECHNIQUE TO BE USED
• Introduced by Dong et al., named as WormPlaner
• Based on the planarity of graph, which is drawn based on the
connectivity information.
• No Special hardware or synchronization needed.
• WormPlanar exploits location free network planarization technique
to perform connectivity based wormhole detection to detect symptoms
of attack.
WORMPLANER
• A connected planarization topology is extracted from normal Network Graph.
• Planarization algorithm will fail in case of wormhole attack, so planarity can be
validated to confirm worm hole attack.
• WormPlaner Protocol has two stages, Local Planarity Test and Refinement process.
• Local planarity test is applied on each node to collect k-hop neighbors information.
• Then Planarization algorithm will be applied on each node’s neighborhood sub
graph.
• Nodes, failing planarity test will be suspected node and further refinement process
will be applied to detect sure wormhole nodes.
• Further, Refinement Process is applied to eliminate false positives.
WORMPLANER
Advantages
• Foolproof Solution
• Detects all malicious nodes
• No False positives
Limitation
• Merely detection is possible, no
avoidance solution
Wormhole attack
REFERENCES
• Aarti, S. S. T. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks.
International Journal of Advanced Research in Computer Science and Software Engineering, 3(5).
• de Graaf, R., Hegazy, I., Horton, J., & Safavi-Naini, R. (2010). Distributed detection of wormhole attacks in
wireless sensor networks Ad Hoc Networks (pp. 208-223): Springer.
• Dong, D., Li, Z., Liu, Y., & Liao, X. (2009). Wormcircle: Connectivity-based wormhole detection in wireless ad hoc
and sensor networks. Paper presented at the Parallel and Distributed Systems (ICPADS), 2009 15th
International Conference on.
• Dong, D., Liao, X., Liu, Y., Li, X.-Y., & Pang, Z. (2013). Fine-grained location-free planarization in wireless sensor
networks. Mobile Computing, IEEE Transactions on, 12(5), 971-983.
• HAOYANG, H., FANYE, SONGWULU, ANDLIXIA ZHANG,. (2004). Security in mobile ad hoc networks:
Challenges and solutions UCLA Previously Published Works.
• Hu, L., & Evans, D. (2004). Using Directional Antennas to Prevent Wormhole Attacks. Paper presented at the
NDSS.
• Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in
Communications, IEEE Journal on, 24(2), 370-380.
• Jeroen Hoebeke, I. M., Bart Dhoedt and Piet Demeester. An Overview of Mobile Ad Hoc Networks: Applications
and Challenges.
REFERENCES
• Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc
Networks, 6(3), 344-362.
• Khan, Z. A., & Islam, M. H. (2012, 8-9 Oct. 2012). Wormhole attack: A new detection technique. Paper presented at the Emerging
Technologies (ICET), 2012 International Conference on.
• Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing wormhole attacks on wireless ad hoc networks: a
graph theoretic approach. Paper presented at the Wireless Communications and Networking Conference, 2005 IEEE.
• Özdemir, S., Meghdadi, M., & Güler, Ý. (2008). A time and trust based wormhole detection algorithm for wireless sensor networks. Paper
presented at the manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC’08).
• Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded
Computing Systems (TECS), 3(3), 634-660.
• Priyanka Goyal, V. P., Rahul Rishi. (2011). MANET: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of
Computational Engineering & Management, 11.
• Qian, L., Song, N., & Li, X. (2007). Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis
approach. Journal of Network and Computer Applications, 30(1), 308-330.
• Rashid Sheikhl Mahakal Singh Chandee, D. K. M. (2010). Security Issues in MANET: A Review IEEE.
• Saurabh Upadhyaya, B. K. C. (2011). Impact of Wormhole Attacks on MANETs. International Journal of Computer Science & Emerging
Technologies, 2(1).
REFERENCES
• Shams Qazi, R. R., Yi Mu, Willy Susilo. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks.
Journal of Network and Computer Applications.
• Tran Van Phuong, N. T. C., Young-Koo Lee, Sungyoung Lee, Heejo Lee. (2007). Transmission Time-based Mechanism to
Detect Wormhole Attacks Paper presented at the Asia-Pacific Services Computing Conference.
• Vani, A., & Rao, D. S. (2011). A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In
Ad Hoc Wireless Networks. International Journal on Computer Science and Engineering (IJCSE), 3(6), 2377-2384.
• Venkataraman, R., Pushpalatha, M., Rao, T. R., & Khemka, R. (2009). A graphtheoretic algorithm for detection of
multiple wormhole attacks in mobile ad hoc networks. International Journal of Recent Trends in Engineering (IJRTE),
1(2), 220-222.
• Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks.
Wireless Communications and Mobile Computing, 6(4), 483-503.
• Xiaopei, L., Dezun, D., & Xiangke, L. (2013, 1-4 Oct. 2013). WormPlanar: Topological Planarization Based Wormhole
Detection in Wireless Networks. Paper presented at the Parallel Processing (ICPP), 2013 42nd International Conference
on.
• Xiaopei Lu, D. D., Xiangke Liao. (2013). WormPlanar: Topological Planarization based Wormhole Detection in
WirelessNetworks. Paper presented at the 42nd International Conference on Parallel Processing.

More Related Content

What's hot

Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introductionChandra Meena
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networksPiyush Mittal
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLjunnubabu
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksjuno susi
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 

What's hot (20)

Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Lecture 1 mobile and adhoc network- introduction
Lecture 1  mobile and adhoc network- introductionLecture 1  mobile and adhoc network- introduction
Lecture 1 mobile and adhoc network- introduction
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
MEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROLMEDIUM ACCESS CONTROL
MEDIUM ACCESS CONTROL
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 

Similar to Wormhole attack

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.pptraosg
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkTarun Varshney
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor networkRABIA ASHRAFI
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksSaeid Hossein Pour
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperabilityvenkateshphd15
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a reviewijitjournal
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasuresMuqeed Abdul
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsnMuqeed Abdul
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsEditor IJMTER
 

Similar to Wormhole attack (20)

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppteabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
eabcdefghiaasjsdfasdfasdfasdfasdfas1.ppt
 
D0961927
D0961927D0961927
D0961927
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Manet - The Art of Networking without a Network
Manet - The Art of Networking without a NetworkManet - The Art of Networking without a Network
Manet - The Art of Networking without a Network
 
security in wireless sensor network
security in wireless sensor networksecurity in wireless sensor network
security in wireless sensor network
 
Redundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor NetworksRedundancy Management in Heterogeneous Wireless Sensor Networks
Redundancy Management in Heterogeneous Wireless Sensor Networks
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Manet ppt
Manet pptManet ppt
Manet ppt
 
Routing protocol for effective interoperability
Routing protocol for effective interoperabilityRouting protocol for effective interoperability
Routing protocol for effective interoperability
 
N0363079085
N0363079085N0363079085
N0363079085
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
Secure routing in wsn-attacks and countermeasures
Secure routing in  wsn-attacks and countermeasuresSecure routing in  wsn-attacks and countermeasures
Secure routing in wsn-attacks and countermeasures
 
11011 a0449 secure routing wsn
11011 a0449 secure routing wsn11011 a0449 secure routing wsn
11011 a0449 secure routing wsn
 
Aodv
AodvAodv
Aodv
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
Sensor
SensorSensor
Sensor
 
Detection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manetsDetection of-sybil-attack-using-position-verification-method-in-manets
Detection of-sybil-attack-using-position-verification-method-in-manets
 

More from Harsh Kishore Mishra

More from Harsh Kishore Mishra (13)

Intellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian PerspectiveIntellectual Property Rights : Indian Perspective
Intellectual Property Rights : Indian Perspective
 
IEEE 802.11ac Standard
IEEE 802.11ac StandardIEEE 802.11ac Standard
IEEE 802.11ac Standard
 
Big Data: Issues and Challenges
Big Data: Issues and ChallengesBig Data: Issues and Challenges
Big Data: Issues and Challenges
 
Big data
Big dataBig data
Big data
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Role of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus DefficiencyRole of MicroRNA in Phosphorus Defficiency
Role of MicroRNA in Phosphorus Defficiency
 
Windows 8: inside what and how
Windows 8: inside what and howWindows 8: inside what and how
Windows 8: inside what and how
 
Windows 7 Versions Features
Windows 7 Versions FeaturesWindows 7 Versions Features
Windows 7 Versions Features
 
Software Testing and UML Lab
Software Testing and UML LabSoftware Testing and UML Lab
Software Testing and UML Lab
 
Network security
Network securityNetwork security
Network security
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 
Windows 8 CP
Windows 8 CPWindows 8 CP
Windows 8 CP
 

Recently uploaded

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 

Recently uploaded (12)

Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 

Wormhole attack

  • 1. Presented By:- Harsh Kishore Mishra M.Tech. Cyber Security II Semester
  • 2. OUTLINE • Introduction • Mobile Ad-Hoc Network • Applications of MANET • Challenges and Issues • Attacks on MANET • Wormhole Attack • Past Work towards Wormhole Attack • Technique to be used • Conclusion
  • 3. INTRODUCTION • Wireless Networks are ubiquitous and provides great advantages. • Two types of wireless networks, Infrastructure and Ad Hoc • Ad Hoc networks attracts great attention. • Provides convenience, mobility, scalability, cost and Easy Setup. • Vulnerable to various attacks due to functionality and deployment scenario.
  • 4. MOBILE ADHOC NETWORK An infrastructure less collection of mobile nodes that can arbitrarily change their geographic locations such that these networks have dynamic topologies and random mobility with constrained resources.
  • 5. MOBILE ADHOC NETWORK • A collection of wireless mobile nodes that communicate with each other without the use of any pre established network infrastructure. • It is decentralized, all network and routing activities are handled by nodes. • Wireless nodes are free to move and causes dynamic topology. • Nodes operates by co operating with each other for data. • Suitable for situations and applications where infrastructure is not possible.
  • 6. APPLICATIONS OF MANETS • Military communication and operations • Automated battlefields • Emergency services • Search and rescue operations • E-commerce: electronic payments anytime and anywhere • Business: dynamic database access, mobile offices • Personal area networks (PAN) • Networks at construction sites • Universities, Virtual classrooms and campus settings • Ad hoc communications during meetings or lectures • Multi-user games • Wireless P2P networking and Outdoor Internet access
  • 7. CHALLENGES AND ISSUES • Routing • Service and Resource Discovery • Security and Node Cooperation • Dynamic Topology • No Centralized Authority • Bandwidth Constraint • Limited Energy Source • No Predefined Boundary
  • 8. ATTACKS ON MANET • Eavesdropping • Denial of Service • Jamming • Black hole Attack • Rushing Attack • Wormhole Attack • Sinkhole Attack • Session hijacking
  • 9. WORMHOLE ATTACK • Wormhole nodes fake a route that is shorter than the original one within the network; this can confuse routing mechanisms which rely on the knowledge about distance between nodes. • It has one or more malicious nodes and a tunnel between them. • The attacking node captures the packets from one location and transmits them to other distant located node which distributes them locally. • A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes or cryptographic mechanisms.
  • 10. WORMHOLE ATTACK The tunnel is either the wired link or a high frequency links. This creates the illusion that the two end points of the tunnel are very close to each other.
  • 11. ATTACK MEDIUM In Band Attack Out of Band Attack
  • 12. ATTACKING MODES Wormhole Attack Modes Hidden Modes Packet Encapsulation Packet Replay Participation Modes High Power Transmission Out of Band
  • 13. • 1) Packet Encapsulation: Each packet is routed via the legitimate path only, when received by the wormhole end, gets encapsulated to prevent nodes on way from incrementing hop counts. The packet is brought into original form by the second end point. • 2) Out-of-Band: This two-ended wormhole, a dedicated out-of-band high bandwidth channel is placed between end points to create a wormhole link. • 3) High-Power-Transmission: This kind of wormhole approach has only one malicious node with much high transmission capability that attracts the packets to follow path passing from it. • 4) Packet Relay: In packet relay two malicious nodes relay packet between two nodes which are far apart from each other and convenience these nodes that they are neighbor.
  • 14. EFFECTS OF THE ATTACK • Selectively drop data packets • Routing disruption • Traffic analysis for information leaking. • Bypasses and attracts a large amount of network traffic • Collect and manipulate network traffic like modifying packets, changing the sequence of packets, and etc. • By analyzing collected network data, the attacker can perform many other more aggressive attacks, such as man-in-the-middle attacks, cipher breaking, protocol reverse engineering etc.
  • 15. EXISTING SOLUTIONS TOWARDS WORMHOLE ATTACKS • Concept of geographical and temporal packet leashes • Directional Antenna • Connectivity Based Approach • Transmission Time Based Mechanism • LITEWORP and MOBIWORP • Digital Signature based Approach • Diffusion of Innovation theory based Approach • Protocol Specific Solutions • SAM (Statistical Analysis of Multipath) • Graphical and Topological Information based Approaches
  • 16. Method Requirements Comments Packet Leaches Geographical and Temporal Loosely synchronized clocks Straightforward solution but has general limitations of GPS technology Directional Antennas Nodes use specific ‘sectors’ of their antennas to communicate with each other It is not directly applicable to other networks Connectivity based approaches connectivity information and need tightly synchronized clocks Requirements are not realistic MOBIWORP and LITEWORP Loosely synchronized clocks and Central Authority Applicable to static network Digital Signature based Nodes should know each other’s Digital Signature Computation time
  • 17. Method Requirements Comments Diffusion of Innovation Based Nodes confirmation End to end delay is increased Transmission Time based Calculation of RTT between nodes Accuracy of RTT Protocol Specific Modification in Protocols Works for specific protocols SAM Statistically calculation of relative frequency of path Non Multi hop path protocol not supported Graphical and topological based Miscellaneous Protocol specific, limitations
  • 18. TECHNIQUE TO BE USED • Introduced by Dong et al., named as WormPlaner • Based on the planarity of graph, which is drawn based on the connectivity information. • No Special hardware or synchronization needed. • WormPlanar exploits location free network planarization technique to perform connectivity based wormhole detection to detect symptoms of attack.
  • 19. WORMPLANER • A connected planarization topology is extracted from normal Network Graph. • Planarization algorithm will fail in case of wormhole attack, so planarity can be validated to confirm worm hole attack. • WormPlaner Protocol has two stages, Local Planarity Test and Refinement process. • Local planarity test is applied on each node to collect k-hop neighbors information. • Then Planarization algorithm will be applied on each node’s neighborhood sub graph. • Nodes, failing planarity test will be suspected node and further refinement process will be applied to detect sure wormhole nodes. • Further, Refinement Process is applied to eliminate false positives.
  • 20. WORMPLANER Advantages • Foolproof Solution • Detects all malicious nodes • No False positives Limitation • Merely detection is possible, no avoidance solution
  • 22. REFERENCES • Aarti, S. S. T. (2013). Study of MANET: Characteristics, Challenges, Application and Security Attacks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5). • de Graaf, R., Hegazy, I., Horton, J., & Safavi-Naini, R. (2010). Distributed detection of wormhole attacks in wireless sensor networks Ad Hoc Networks (pp. 208-223): Springer. • Dong, D., Li, Z., Liu, Y., & Liao, X. (2009). Wormcircle: Connectivity-based wormhole detection in wireless ad hoc and sensor networks. Paper presented at the Parallel and Distributed Systems (ICPADS), 2009 15th International Conference on. • Dong, D., Liao, X., Liu, Y., Li, X.-Y., & Pang, Z. (2013). Fine-grained location-free planarization in wireless sensor networks. Mobile Computing, IEEE Transactions on, 12(5), 971-983. • HAOYANG, H., FANYE, SONGWULU, ANDLIXIA ZHANG,. (2004). Security in mobile ad hoc networks: Challenges and solutions UCLA Previously Published Works. • Hu, L., & Evans, D. (2004). Using Directional Antennas to Prevent Wormhole Attacks. Paper presented at the NDSS. • Hu, Y.-C., Perrig, A., & Johnson, D. B. (2006). Wormhole attacks in wireless networks. Selected Areas in Communications, IEEE Journal on, 24(2), 370-380. • Jeroen Hoebeke, I. M., Bart Dhoedt and Piet Demeester. An Overview of Mobile Ad Hoc Networks: Applications and Challenges.
  • 23. REFERENCES • Khalil, I., Bagchi, S., & Shroff, N. B. (2008). MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 6(3), 344-362. • Khan, Z. A., & Islam, M. H. (2012, 8-9 Oct. 2012). Wormhole attack: A new detection technique. Paper presented at the Emerging Technologies (ICET), 2012 International Conference on. • Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. (2005). Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. Paper presented at the Wireless Communications and Networking Conference, 2005 IEEE. • Özdemir, S., Meghdadi, M., & Güler, Ý. (2008). A time and trust based wormhole detection algorithm for wireless sensor networks. Paper presented at the manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC’08). • Park, T., & Shin, K. G. (2004). LiSP: A lightweight security protocol for wireless sensor networks. ACM Transactions on Embedded Computing Systems (TECS), 3(3), 634-660. • Priyanka Goyal, V. P., Rahul Rishi. (2011). MANET: Vulnerabilities, Challenges, Attacks, Application. IJCEM International Journal of Computational Engineering & Management, 11. • Qian, L., Song, N., & Li, X. (2007). Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach. Journal of Network and Computer Applications, 30(1), 308-330. • Rashid Sheikhl Mahakal Singh Chandee, D. K. M. (2010). Security Issues in MANET: A Review IEEE. • Saurabh Upadhyaya, B. K. C. (2011). Impact of Wormhole Attacks on MANETs. International Journal of Computer Science & Emerging Technologies, 2(1).
  • 24. REFERENCES • Shams Qazi, R. R., Yi Mu, Willy Susilo. (2013). Securing DSR against wormhole attacks in multirate ad hoc networks. Journal of Network and Computer Applications. • Tran Van Phuong, N. T. C., Young-Koo Lee, Sungyoung Lee, Heejo Lee. (2007). Transmission Time-based Mechanism to Detect Wormhole Attacks Paper presented at the Asia-Pacific Services Computing Conference. • Vani, A., & Rao, D. S. (2011). A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks. International Journal on Computer Science and Engineering (IJCSE), 3(6), 2377-2384. • Venkataraman, R., Pushpalatha, M., Rao, T. R., & Khemka, R. (2009). A graphtheoretic algorithm for detection of multiple wormhole attacks in mobile ad hoc networks. International Journal of Recent Trends in Engineering (IJRTE), 1(2), 220-222. • Wang, W., Bhargava, B., Lu, Y., & Wu, X. (2006). Defending against wormhole attacks in mobile ad hoc networks. Wireless Communications and Mobile Computing, 6(4), 483-503. • Xiaopei, L., Dezun, D., & Xiangke, L. (2013, 1-4 Oct. 2013). WormPlanar: Topological Planarization Based Wormhole Detection in Wireless Networks. Paper presented at the Parallel Processing (ICPP), 2013 42nd International Conference on. • Xiaopei Lu, D. D., Xiangke Liao. (2013). WormPlanar: Topological Planarization based Wormhole Detection in WirelessNetworks. Paper presented at the 42nd International Conference on Parallel Processing.