Wormhole Attack Detection in Geographic Routing Protocol
 
More details
Hide details
Publication date: 2019-11-23
 
Eurasian J Anal Chem 2017;12(4):281–290
 
KEYWORDS
ABSTRACT
As mobile ad hoc network applications are deployed, security emerges as a central requirement. Position aided routing protocols can offer a significant performance increase over traditional ad hoc routing protocols. Boundary State Routing is a geographic routing protocol which routes the data using the location of the nodes. Geographic routing protocols are known to be particularly susceptible to attacks. In this paper, we present the possible attacks on BSR protocol. One of the most popular and serious attacks in ad hoc networks is wormhole attack in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at that remote location. A wormhole attack is very powerful, and preventing the attack has proven to be very difficult. In this paper, we devise efficient methods to detect and avoid wormhole attacks in the BSR protocol. The first method namely Counter March Technique attempts to detect the intrusion action .The second technique namely Signature Based Verification Technique uses cryptographic concepts to detect and prevent wormhole attacks. It not only detects the fake route but also adopts preventive measures against action wormhole nodes from reappearing during routing. The proposed system is designed in Boundary state routing protocol and analysis and simulations are performed in network simulator.
eISSN:1306-3057