Detection of wormhole attack in mobile ad-hoc networks

An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary a...

Full description

Saved in:
Bibliographic Details
Main Author: Sanaei, Mojtaba Ghanaatpisheh
Format: Thesis
Language:English
Published: 2013
Subjects:
Online Access:http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.37029
record_format uketd_dc
spelling my-utm-ep.370292017-07-17T08:28:19Z Detection of wormhole attack in mobile ad-hoc networks 2013-06 Sanaei, Mojtaba Ghanaatpisheh TK6570 Mobile Communication System An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary application of Mobile Ad-hoc Networks (MANETs) is for military purpose including the tactical operations where security is often the major concern. The different leaks that threaten the security of wireless network contain, selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One of the dangerous attacks in mobile ad hoc network is named as wormhole attack in which two or more destructive nodes record the packets at one point and transmits them by a wired or wireless to another point in the network. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. The using a cryptographic technique is not enough to prevent wormhole attack. So, in this study, a new method is proposed based on modifying the forwarding packet process and also using a delay per hop and expiry time technique to detect wormhole. The performance evaluation of the proposed method is done using a mathematical modeling and simulation. 2013-06 Thesis http://eprints.utm.my/id/eprint/37029/ http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:70090?site_name=Restricted Repository masters Universiti Teknologi Malaysia, Faculty of Computing Faculty of Computing
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic TK6570 Mobile Communication System
spellingShingle TK6570 Mobile Communication System
Sanaei, Mojtaba Ghanaatpisheh
Detection of wormhole attack in mobile ad-hoc networks
description An ad-hoc network is a group of wireless mobile node that shapes a temporary network without any infrastructure and centralized management. Each mobile node functions are not only restricted to base station but also as router for forwarding packets to other mobile nodes in the network. One primary application of Mobile Ad-hoc Networks (MANETs) is for military purpose including the tactical operations where security is often the major concern. The different leaks that threaten the security of wireless network contain, selective forwarding, wormhole attack, Sybil attack, sinkhole attack and black hole attack. One of the dangerous attacks in mobile ad hoc network is named as wormhole attack in which two or more destructive nodes record the packets at one point and transmits them by a wired or wireless to another point in the network. Wormhole attack is so strong and detection of this attack is hard. Also, the wormhole attack may cause another type of attacks like Sinkhole or Select forwarding. The using a cryptographic technique is not enough to prevent wormhole attack. So, in this study, a new method is proposed based on modifying the forwarding packet process and also using a delay per hop and expiry time technique to detect wormhole. The performance evaluation of the proposed method is done using a mathematical modeling and simulation.
format Thesis
qualification_level Master's degree
author Sanaei, Mojtaba Ghanaatpisheh
author_facet Sanaei, Mojtaba Ghanaatpisheh
author_sort Sanaei, Mojtaba Ghanaatpisheh
title Detection of wormhole attack in mobile ad-hoc networks
title_short Detection of wormhole attack in mobile ad-hoc networks
title_full Detection of wormhole attack in mobile ad-hoc networks
title_fullStr Detection of wormhole attack in mobile ad-hoc networks
title_full_unstemmed Detection of wormhole attack in mobile ad-hoc networks
title_sort detection of wormhole attack in mobile ad-hoc networks
granting_institution Universiti Teknologi Malaysia, Faculty of Computing
granting_department Faculty of Computing
publishDate 2013
url http://eprints.utm.my/id/eprint/37029/5/MojtabaGhanaatPishehMFSKSM2013.pdf
_version_ 1747816493717913600