Visible to the public Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)

TitleGraph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Publication TypeConference Paper
Year of Publication2018
AuthorsRmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A.
Conference Name2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)
KeywordsCommunication system security, composability, end-nodes, Extremities, graph theory, malicious nodes, MANET, MANET Attack Detection, Metrics, mobile ad hoc networks, mobile computing, network level, pubcrawl, Resiliency, Routing, telecommunication network routing, telecommunication security, Wireless communication, wireless medium, wormhole attack detection, Wormhole tunnel
Abstract

A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.

URLhttps://ieeexplore.ieee.org/document/8311439
DOI10.1109/MOBISECSERV.2018.8311439
Citation Keyrmayti_graph-based_2018