SlideShare a Scribd company logo
1 of 17
Presented by : Farrukh Azad
M. Jain and H. Kandwal
Dept. Of Inf. Technol., Guru Gobind Singh Indraprastha Univ., New Delhi, India
International Conference on Advances in Computing, Control, &
Telecommunication Technologies, 2009. ACT '09. December 2009, pp. 555-558
IEEE
1
Wormhole Attack
 A malicious node captures packets from one
location in the network, and tunnels them to
another malicious node at a distant point, which
replays them locally.
 The tunnel can be established:
 through an out-of-band hidden channel (e.g., a wired
link)
 packet encapsulation
 High powered transmission
2
Wormhole Attack Modes
 Wormhole attacks can be launched using
several modes, among these modes are
 Wormhole using encapsulation
 Wormhole Out-of-Band Channel
 Wormhole with High Power Transmission
 Wormhole using Packet Relay
 Wormhole using Protocol Deviations
3
Wormhole Using Encapsulation
 A want to communicate with B, A broadcast RREQ.
 X (malicious node) receive RREQ .
 Encapsulation RREQ and send to Y (malicious node)
 B select path A-X-Y-B (3 hops) , drop path A-C-D-E-B(4 Hops)
 This prevents nodes from discovering legitimate paths that are
more than two hops away.
4
Wormhole Out-of-Band Channel
 Out-of-Band Channel:
 a long range directional wireless link
 direct wired link
 difficult to launch than the previous one since it
needs specialized hardware capability.
5
Wormhole with High Power Transmission
 a single malicious node gets a RREQ(without the
participation of a colluding node)
 Broadcasts the request at a high power level
 Any node that hears the high-power broadcast
rebroadcasts it towards the destination.
6
Wormhole Using Packet Relay
 a malicious node relays packets between two
distant nodes to convince them that they are
neighbors
7
Wormhole Using Protocol Deviations
 During the RREQ forwarding, the nodes typically
back off for a random amount of time before
forwarding reduce MAC layer collisions.
 A malicious node can create a wormhole by
simply not complying with the protocol and
broadcasting without backing off.
 The purpose is to let the request packet it
forwards arrive first at the destination.
8
Classification Of Wormholes
 Three types: closed, half open, and open.
 Open Wormhole Attack:
 the attackers include themselves in the RREQ packet header
following the route discovery procedure.
 Other nodes are aware that the malicious nodes lie on the path but
they would think that the malicious nodes are direct neighbors.
9
Classification Of Wormholes
 Half open Wormhole Attack
 One side of wormhole does not modify the packet
and only another side modifies the packet,
following the route discovery procedure.
10
Classification Of Wormholes
 Closed Wormhole Attack
 The attackers do not modify the content of the
packet, even the packet in a route discovery
packet.
 they simply tunnel the packet
11
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
12
Advantages:
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
smaller
probability of a
RREQ
being discarded
smaller
probability of a
RREQ
being discarded
smaller
probability of a
RREQ
being discarded
Control packet
seems
to arrive using
the
minimum
number of
Hops
Min number of
hops.
Min number of
hops.
Min number of
hops.
Control packet
Arrives faster
Control packets
arrive faster
Two nodes
think
they are
neighbors
Control packet
arrives
faster.
No need for
colluding nodes
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
13
Disadvantages
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
Resources and
time
consumption in
packet
encapsulation
specialized
hardware
capability
Needs power spend
resources
for
Processing
RREQ
packets and
hiding
their IDs
collisions
occurrence
time
difference in
control
packets arrival
could
be very
remarkable.
difference be
noticed high
speed
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
14
Challenges to be faced
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
having a
predetermined
Path to colluding
node
special
Hardware
Power
adjustments
are
needed
proper
positions
for malicious
nodes
Collisions
Hiding malicious
node
Names
intermediate
Node can
checks the
contents of the
sent
Packet
Optimum
number of relaying
Communication
between relaying
nodes
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
15
Possible solutions for challenges
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
having a
predetermined
Path to colluding
node
special
Hardware
Power
adjustments
are
needed
proper
positions
for malicious
nodes
Collisions
Hiding malicious
node
Names
intermediate
Node can
checks the
contents of the
sent
Packet
Optimum
number of relaying
Communication
between relaying
nodes
send regular RREQ
packets to establish
paths.
complex attacks will
solve this problem
different power levels
primary network
topology.
Start by having a large
number of relaying nodes
and then minimize them to
get the optimum
performance.
A priority or round robin
scheme for malicious nodes
packets could be used
References
[1] C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and
Countermeasures," in 1st IEEE International Workshop on Sensor Network Protocols and
Applications (WSNA), 2003, pp. 113-127.
[2] Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole
Attacks in Wireless Networks," in 22nd Annual Joint Conference of the IEEE Computer and
Communications Societies (INFOCOM), 2003, pp. 1976-1986.
[3] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," in
Network and Distributed System Security Symposium (NDSS), San Diego.2004 ,
[4] I. Khalil, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in
Multihop Wireless Networks," in DSN '05: Proceedings of the 2005 International
Conference on Dependable Systems and Networks (DSN'05), 2005, pp. 612-621.
[5] K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole
Attack in Static Multihop Wireless Networks," The International Journal of Computer and
Telecommunications Networking vol. 51, pp. 3750 3772, 2007.
[6] W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending Against Wormhole Attacks in
Mobile Ad Hoc Networks," Wiley Journal on Wireless Communications and Mobile
Computing, vol. 5, pp. 1- 21, 2005.
[7] K. Lee, H. Jeon, and D. Kim, "Wormhole Detection Method based on Location in
Wireless Ad-Hoc Networks," in New Technologies, Mobility and Security: Springer
Netherlands, 2007, pp. 361-372.
16
17

More Related Content

What's hot

Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
Meena S Pandi
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
Zdravko Danailov
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
Piyush Mittal
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
Piyush Mittal
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
Kunal Prajapati
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
Vishnu Kudumula
 

What's hot (20)

D0961927
D0961927D0961927
D0961927
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Protocol manet
Protocol manetProtocol manet
Protocol manet
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Black hole attack
Black hole attackBlack hole attack
Black hole attack
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Security in wireless sensor networks
Security in wireless sensor networksSecurity in wireless sensor networks
Security in wireless sensor networks
 
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANETA Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 

Similar to A survey on complex wormhole attack in wireless

Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
busireddy harish
 

Similar to A survey on complex wormhole attack in wireless (20)

Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKSA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
 
Vampire attacks
Vampire attacksVampire attacks
Vampire attacks
 
Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02Vampireattacks 131109081959-phpapp02
Vampireattacks 131109081959-phpapp02
 
Wormhole attack mitigation in manet a
Wormhole attack mitigation in manet aWormhole attack mitigation in manet a
Wormhole attack mitigation in manet a
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole AttackPerformance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
 
Various Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networksVarious Security Attacks in mobile ad hoc networks
Various Security Attacks in mobile ad hoc networks
 
A novel approach for preventing black hole
A novel approach for preventing black holeA novel approach for preventing black hole
A novel approach for preventing black hole
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A SurveyDetecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
 

Recently uploaded

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
anilsa9823
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 

A survey on complex wormhole attack in wireless

  • 1. Presented by : Farrukh Azad M. Jain and H. Kandwal Dept. Of Inf. Technol., Guru Gobind Singh Indraprastha Univ., New Delhi, India International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. December 2009, pp. 555-558 IEEE 1
  • 2. Wormhole Attack  A malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally.  The tunnel can be established:  through an out-of-band hidden channel (e.g., a wired link)  packet encapsulation  High powered transmission 2
  • 3. Wormhole Attack Modes  Wormhole attacks can be launched using several modes, among these modes are  Wormhole using encapsulation  Wormhole Out-of-Band Channel  Wormhole with High Power Transmission  Wormhole using Packet Relay  Wormhole using Protocol Deviations 3
  • 4. Wormhole Using Encapsulation  A want to communicate with B, A broadcast RREQ.  X (malicious node) receive RREQ .  Encapsulation RREQ and send to Y (malicious node)  B select path A-X-Y-B (3 hops) , drop path A-C-D-E-B(4 Hops)  This prevents nodes from discovering legitimate paths that are more than two hops away. 4
  • 5. Wormhole Out-of-Band Channel  Out-of-Band Channel:  a long range directional wireless link  direct wired link  difficult to launch than the previous one since it needs specialized hardware capability. 5
  • 6. Wormhole with High Power Transmission  a single malicious node gets a RREQ(without the participation of a colluding node)  Broadcasts the request at a high power level  Any node that hears the high-power broadcast rebroadcasts it towards the destination. 6
  • 7. Wormhole Using Packet Relay  a malicious node relays packets between two distant nodes to convince them that they are neighbors 7
  • 8. Wormhole Using Protocol Deviations  During the RREQ forwarding, the nodes typically back off for a random amount of time before forwarding reduce MAC layer collisions.  A malicious node can create a wormhole by simply not complying with the protocol and broadcasting without backing off.  The purpose is to let the request packet it forwards arrive first at the destination. 8
  • 9. Classification Of Wormholes  Three types: closed, half open, and open.  Open Wormhole Attack:  the attackers include themselves in the RREQ packet header following the route discovery procedure.  Other nodes are aware that the malicious nodes lie on the path but they would think that the malicious nodes are direct neighbors. 9
  • 10. Classification Of Wormholes  Half open Wormhole Attack  One side of wormhole does not modify the packet and only another side modifies the packet, following the route discovery procedure. 10
  • 11. Classification Of Wormholes  Closed Wormhole Attack  The attackers do not modify the content of the packet, even the packet in a route discovery packet.  they simply tunnel the packet 11
  • 12. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 12 Advantages: Encapsulation Out of Band High Power Packet Relay Protocol Deviations smaller probability of a RREQ being discarded smaller probability of a RREQ being discarded smaller probability of a RREQ being discarded Control packet seems to arrive using the minimum number of Hops Min number of hops. Min number of hops. Min number of hops. Control packet Arrives faster Control packets arrive faster Two nodes think they are neighbors Control packet arrives faster. No need for colluding nodes
  • 13. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 13 Disadvantages Encapsulation Out of Band High Power Packet Relay Protocol Deviations Resources and time consumption in packet encapsulation specialized hardware capability Needs power spend resources for Processing RREQ packets and hiding their IDs collisions occurrence time difference in control packets arrival could be very remarkable. difference be noticed high speed
  • 14. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 14 Challenges to be faced Encapsulation Out of Band High Power Packet Relay Protocol Deviations having a predetermined Path to colluding node special Hardware Power adjustments are needed proper positions for malicious nodes Collisions Hiding malicious node Names intermediate Node can checks the contents of the sent Packet Optimum number of relaying Communication between relaying nodes
  • 15. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 15 Possible solutions for challenges Encapsulation Out of Band High Power Packet Relay Protocol Deviations having a predetermined Path to colluding node special Hardware Power adjustments are needed proper positions for malicious nodes Collisions Hiding malicious node Names intermediate Node can checks the contents of the sent Packet Optimum number of relaying Communication between relaying nodes send regular RREQ packets to establish paths. complex attacks will solve this problem different power levels primary network topology. Start by having a large number of relaying nodes and then minimize them to get the optimum performance. A priority or round robin scheme for malicious nodes packets could be used
  • 16. References [1] C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and Countermeasures," in 1st IEEE International Workshop on Sensor Network Protocols and Applications (WSNA), 2003, pp. 113-127. [2] Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks," in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2003, pp. 1976-1986. [3] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," in Network and Distributed System Security Symposium (NDSS), San Diego.2004 , [4] I. Khalil, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," in DSN '05: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005, pp. 612-621. [5] K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks," The International Journal of Computer and Telecommunications Networking vol. 51, pp. 3750 3772, 2007. [6] W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending Against Wormhole Attacks in Mobile Ad Hoc Networks," Wiley Journal on Wireless Communications and Mobile Computing, vol. 5, pp. 1- 21, 2005. [7] K. Lee, H. Jeon, and D. Kim, "Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks," in New Technologies, Mobility and Security: Springer Netherlands, 2007, pp. 361-372. 16
  • 17. 17