Professional Documents
Culture Documents
Security in Mobile Ad-Hoc Networks
Security in Mobile Ad-Hoc Networks
Security in Mobile Ad-Hoc Networks
The Mobile Ad hoc Networks (MANETs) are most certainly a part of this
technological revolution. A MANET is a collection of wireless devices or nodes
that communicate by dispatching packets to one another or on behalf of another
device/node, without having any central network authority or infrastructure
controlling data routing. MANET nodes have limitless connectivity and mobility to
other nodes routing, each node acts as a router and network manager to another
node
The Mobile Ad hoc Networks (MANETs) are most certainly a part of this
technological revolution. A MANET is a collection of wireless devices or nodes
that communicate by dispatching packets to one another or on behalf of another
device/node, without having any central network authority or infrastructure
controlling data routing. MANET nodes have limitless connectivity and mobility to
other nodes routing, each node acts as a router and network manager to another
node
SCOPE
In this attempt, we describe and try to implement a method for preventing
wormhole attack called as Wormhole Attack Prevention (WAP). All nodes monitor
its neighbors behavior when they send RREQ messages to the destination by using
a special list called Neighbor List. When a source node receives some RREP
messages, it can detect a route under wormhole attack among the routes. Once
wormhole node is detected, source node records them in the Wormhole Node List.
Even though malicious nodes have been excluded from routing in the past, the
nodes have a chance of attack once more. Therefore, we store the information of
wormhole nodes at the source node to prevent them taking part in routing again.
Moreover, the WAP has the ability of detecting both the hidden and exposed
attacks without special hardware.
Second Week
AODV Protocol
Basic idea
Two phases:
Route Discovery
When the route is needed, the source sends the RREQ packet in a
controlled flooding manner throughout the network
Route Discovery
3rd Week
Route Maintenance
L2 Trigger
\
. Node C creates Route Error (RERR) message
C creates a Route Error (RERR)
Enters DestCount (=1), Ds IP addr, seq #
Lists all destinations which are now unreachable
DestCount field indicates the number of unreachable
destinations included in the RERR message.
Unicasts RERR to upstream neighbors in precursor list
Forwards RERR to S
4th Week
AODV Message Formats
Route Request (RREQ) Message Format