An Approach to Threats, Analysis and Avoidance of Wormhole Attacks

Amit Sharma

Abstract


As versatile specially appointed network applications are deployed; security develops as a focal prerequisite. In this paper, we present the wormhole assault, a serious assault in specially appointed networks that is especially testing to shield against. The wormhole assault is conceivable regardless of the possibility that the assailant has not compromised any hosts, and regardless of the possibility that all correspondence gives authenticity and classification. In the wormhole assault, an aggressor records parcels (or bits) at one area in the network, burrows them (potentially specifically) to another area, and retransmits them there into the network. The wormhole assault can shape a genuine danger in wireless networks, particularly against numerous specially appointed network steering conventions and area based wireless security frameworks. For instance, most existing specially appointed network directing conventions, without some instrument to protect against the wormhole assault, would be not able discover courses longer than may be a couple bounces, extremely upsetting correspondence. We introduce a general system, called bundle chains, for identifying and in this way safeguarding against wormhole assaults, and we exhibit a particular convention, called TIK, that executes chains. We additionally examine topology-based wormhole location, and demonstrate that it is outlandish for these ways to deal with distinguish some wormhole topologies.

Full Text:

PDF

References


B. M. Leiner, V. G. Cerf, D. D. Clark, R. E. Kahn, L. Kleinrock, D. C. Lynch, J. Postel, L. G. Roberts and S. Wolff, “A Brief History of the Internet,” 2000. http://www.isoc.org/internet/history/brief.shtml

B. B. Gupta, R. C. Joshi and M. Misra, “Defending against Distributed Denial of Service Attacks: Issues and Challenges,” Information Security Journal: A Global Perspective, Vol. 18, No. 5, 2009, pp. 224-247.

C. Douligeris and A. Mitrokotsa “DDoS Attacks and Defense Mechanisms: Classification and State of the Art,” Elsevier Science Direct Computer Networks, Vol. 44, No. 5, 2004, pp. 643-666. doi: 10.1016/j.comnet.2003.10.003

D. Kravetz, “Anonymous Unfurls ‘Operation Titstorm’,” Wired Threat Level Blog, 2010.

J. Nazario, “Politically Motivated Denial of Service Attacks,” Arbor Networks, 2009.

DDoS-for-Hire Service Is Legal and Even Lets FBI Peek in, Says a Guy with an Attorney,” 2012. http://www.ddosdefense.net.

“Internet Creaks Following Cyber Attack on Spamhaus,” 2013. http://www.cbronline.com/news/security/internet-slows-d own-following-ddos-attack-on-spamhaus-280313




DOI: https://doi.org/10.23956/ijarcsse/V7I6/0193

Refbacks

  • There are currently no refbacks.




© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.