Loading...

An Intrusion Detection System for Wormhole Attack Detection in MANETs

Shamaei Chaharsooghi, Shiva | 2013

613 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 44874 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Movaghar, Ali
  7. Abstract:
  8. Mobile ad hoc networks (MANETs) have been attracting the attention of the researchers in the duration of last years. Because of lack of infrastructure in such networks, all network operations such as routing are done by the nodes themselves. On the other hand, standard MANETs' routing protocols suppose that all nodes are trusted. Thus, these protocols are prone to serious security attack. Wormhole attack is one of the attacks which abuse distributed routing in MANETs. This attack is held between two malicious nodes which are far away from each other. Mentioned nodes introduce themselves as one-hop neighbor of each other. Therefore, they deceive normal nodes and disturb the routing mechanism. Moreover, malicious nodes obtain opportunity to perform other attacks by tunneling and attracting network traffic. Hence, the purpose of this thesis is to propose an intrusion detection system to detect such attacks in mobile ad hoc networks. Furthermore, in this thesis wormhole attack is analyzed first; then, an intrusion detection system is proposed to detect such attacks. The proposed algorithm attends to average delay per hop and neighbor nodes's behavior in data forwarding. Proposed IDS can detect all types of wormhole attacks such as in-band and out-band attacks and in the different modes such as hidden or exposed, without any need of special hardware or time synchronization. Proposed IDS not only can detect wormhole attack but also it can locate the malicious node and prevent it from launching wormhole attack again. In addition, proposed algorithm has lower false positive and false negative rate in comparison with delay based methods. Moreover, it has lower false positive rate and also lower energy consumption in comparison with behavior monitoring schemes
  9. Keywords:
  10. Wormhole Attack ; Wormhole Tunnel ; Wormhole Attack Detection Method ; Intrusion Detection System ; Mobile Ad Hoc Network

 Digital Object List

 Bookmark

No TOC