Font Size: a A A

Research On Wormhole Attack Detection In Mobile Ad Hoc Network

Posted on:2012-01-21Degree:MasterType:Thesis
Country:ChinaCandidate:J YangFull Text:PDF
GTID:2248330395985413Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Since MANET is a network that is self-organized, dynamic topology based andwireless communication allowed and does not require a centralized entity, thesefeatures make this network an attraction to attackers, such as Black hole attack,Denial of Service attack, Replay attack and Wormhole attack. Aiming to attack ad hocrouting protocol, Wormhole attack is malicious to Mobile Ad hoc network. It iscritical important to guarantee the detecting and avoiding mechanism in wormholeattack to consolidate the security of routing protocol.Communicating through a private high quality and high bandwidth tunnel,Wormhole attack generally consists of two malicious nodes. Wormhole nodeoverhears packets in the network, tunnels them to other nodes through the private linkand replays into network. So the wormhole node can interfere with transmission of theroute information in particular network, can destroy the normal selecting route andcan make the route process an ultimate failure.The main works of this dissertation are as follows:(1) This paper introduced theconception, characteristics, basic system structure and the applications of Mobile Adhoc network; the paper also introduced the vulnerabilities, security requirements andgoals, then researched on its security problems and analyzed variable kinds of attacksin Mobile Ad hoc network.(2)This paper pointed out the direction of security problemof Mobile Ad hoc network and revealed the corresponding questions; starting with thetheory and characteristic of wormhole attack, the paper analyzed the harmfulness toMANET; then, the paper analyzed detailed current research on detecting technologyof wormhole attack, the paper also summarized and researched the kinds of existingwormhole attack solutions; this paper proposed the existing problem based on theanalysis and comparison of several typical solutions.(3)In the comprehensivereference on the basis of existing researches and considering the disadvantages of themethods, the paper proposed a statistical analysis method based on RTT detection ofwormhole attack. During route setup procedure, this paper statistically analyzed thecollected route information and computed the frequency of each link appeared in theroute information before destination node sends RREP to the source node. Then,combining the transmission time between every two successive nodes along theestablished path to select route, this method is easy to implement and does not need special hardware equipment. The RTT computes each node that has little calculations,and the extra expenses are at low rate.(4)Simulating the experiment in NS2, resultsshow that the method can efficiently detect wormhole attack. Because the wormholewill be detected in the route setup, so the method can well defense wormhole attack.
Keywords/Search Tags:Mobile Ad hoc network, wormhole attack, Statistical analysis, round triptime
PDF Full Text Request
Related items