SlideShare a Scribd company logo
Presented by : Farrukh Azad
M. Jain and H. Kandwal
Dept. Of Inf. Technol., Guru Gobind Singh Indraprastha Univ., New Delhi, India
International Conference on Advances in Computing, Control, &
Telecommunication Technologies, 2009. ACT '09. December 2009, pp. 555-558
IEEE
1
Wormhole Attack
 A malicious node captures packets from one
location in the network, and tunnels them to
another malicious node at a distant point, which
replays them locally.
 The tunnel can be established:
 through an out-of-band hidden channel (e.g., a wired
link)
 packet encapsulation
 High powered transmission
2
Wormhole Attack Modes
 Wormhole attacks can be launched using
several modes, among these modes are
 Wormhole using encapsulation
 Wormhole Out-of-Band Channel
 Wormhole with High Power Transmission
 Wormhole using Packet Relay
 Wormhole using Protocol Deviations
3
Wormhole Using Encapsulation
 A want to communicate with B, A broadcast RREQ.
 X (malicious node) receive RREQ .
 Encapsulation RREQ and send to Y (malicious node)
 B select path A-X-Y-B (3 hops) , drop path A-C-D-E-B(4 Hops)
 This prevents nodes from discovering legitimate paths that are
more than two hops away.
4
Wormhole Out-of-Band Channel
 Out-of-Band Channel:
 a long range directional wireless link
 direct wired link
 difficult to launch than the previous one since it
needs specialized hardware capability.
5
Wormhole with High Power Transmission
 a single malicious node gets a RREQ(without the
participation of a colluding node)
 Broadcasts the request at a high power level
 Any node that hears the high-power broadcast
rebroadcasts it towards the destination.
6
Wormhole Using Packet Relay
 a malicious node relays packets between two
distant nodes to convince them that they are
neighbors
7
Wormhole Using Protocol Deviations
 During the RREQ forwarding, the nodes typically
back off for a random amount of time before
forwarding reduce MAC layer collisions.
 A malicious node can create a wormhole by
simply not complying with the protocol and
broadcasting without backing off.
 The purpose is to let the request packet it
forwards arrive first at the destination.
8
Classification Of Wormholes
 Three types: closed, half open, and open.
 Open Wormhole Attack:
 the attackers include themselves in the RREQ packet header
following the route discovery procedure.
 Other nodes are aware that the malicious nodes lie on the path but
they would think that the malicious nodes are direct neighbors.
9
Classification Of Wormholes
 Half open Wormhole Attack
 One side of wormhole does not modify the packet
and only another side modifies the packet,
following the route discovery procedure.
10
Classification Of Wormholes
 Closed Wormhole Attack
 The attackers do not modify the content of the
packet, even the packet in a route discovery
packet.
 they simply tunnel the packet
11
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
12
Advantages:
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
smaller
probability of a
RREQ
being discarded
smaller
probability of a
RREQ
being discarded
smaller
probability of a
RREQ
being discarded
Control packet
seems
to arrive using
the
minimum
number of
Hops
Min number of
hops.
Min number of
hops.
Min number of
hops.
Control packet
Arrives faster
Control packets
arrive faster
Two nodes
think
they are
neighbors
Control packet
arrives
faster.
No need for
colluding nodes
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
13
Disadvantages
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
Resources and
time
consumption in
packet
encapsulation
specialized
hardware
capability
Needs power spend
resources
for
Processing
RREQ
packets and
hiding
their IDs
collisions
occurrence
time
difference in
control
packets arrival
could
be very
remarkable.
difference be
noticed high
speed
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
14
Challenges to be faced
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
having a
predetermined
Path to colluding
node
special
Hardware
Power
adjustments
are
needed
proper
positions
for malicious
nodes
Collisions
Hiding malicious
node
Names
intermediate
Node can
checks the
contents of the
sent
Packet
Optimum
number of relaying
Communication
between relaying
nodes
Comparison Between The Wormhole Attack Modes From An
Attacker’s Perspective
15
Possible solutions for challenges
Encapsulation Out of Band High Power Packet Relay Protocol
Deviations
having a
predetermined
Path to colluding
node
special
Hardware
Power
adjustments
are
needed
proper
positions
for malicious
nodes
Collisions
Hiding malicious
node
Names
intermediate
Node can
checks the
contents of the
sent
Packet
Optimum
number of relaying
Communication
between relaying
nodes
send regular RREQ
packets to establish
paths.
complex attacks will
solve this problem
different power levels
primary network
topology.
Start by having a large
number of relaying nodes
and then minimize them to
get the optimum
performance.
A priority or round robin
scheme for malicious nodes
packets could be used
References
[1] C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and
Countermeasures," in 1st IEEE International Workshop on Sensor Network Protocols and
Applications (WSNA), 2003, pp. 113-127.
[2] Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole
Attacks in Wireless Networks," in 22nd Annual Joint Conference of the IEEE Computer and
Communications Societies (INFOCOM), 2003, pp. 1976-1986.
[3] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," in
Network and Distributed System Security Symposium (NDSS), San Diego.2004 ,
[4] I. Khalil, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in
Multihop Wireless Networks," in DSN '05: Proceedings of the 2005 International
Conference on Dependable Systems and Networks (DSN'05), 2005, pp. 612-621.
[5] K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole
Attack in Static Multihop Wireless Networks," The International Journal of Computer and
Telecommunications Networking vol. 51, pp. 3750 3772, 2007.
[6] W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending Against Wormhole Attacks in
Mobile Ad Hoc Networks," Wiley Journal on Wireless Communications and Mobile
Computing, vol. 5, pp. 1- 21, 2005.
[7] K. Lee, H. Jeon, and D. Kim, "Wormhole Detection Method based on Location in
Wireless Ad-Hoc Networks," in New Technologies, Mobility and Security: Springer
Netherlands, 2007, pp. 361-372.
16
17

More Related Content

PDF
Wormhole Attack
PPTX
Wormhole attack
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PDF
wormhole attacks in wireless networks
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
PPTX
NetSim Webinar on Network Attacks and Detection
PPT
Wireless sensor networks
Wormhole Attack
Wormhole attack
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
wormhole attacks in wireless networks
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Detection and prevention of wormhole attack in mobile adhoc networks
NetSim Webinar on Network Attacks and Detection
Wireless sensor networks

What's hot (20)

PDF
D0961927
PPT
Flooding attack manet
PDF
Blackhole attack in Manet
PDF
Wormhole attack detection algorithms in wireless network coding systems
PPTX
Protocol manet
PDF
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
PPTX
Black hole attack
PPTX
Security Issues in MANET
PDF
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
PPT
Attacks in MANET
PDF
Attacks on mobile ad hoc networks
PPTX
Blackhole Attck detection in AODV Protocol
PDF
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PPT
Security in mobile ad hoc networks
PPT
Security in wireless sensor networks
PDF
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
PPTX
Study of security attacks in manet
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PPTX
Abdullah Mukhtar ppt
PPT
security in wireless sensor networks
D0961927
Flooding attack manet
Blackhole attack in Manet
Wormhole attack detection algorithms in wireless network coding systems
Protocol manet
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole attack
Security Issues in MANET
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Attacks in MANET
Attacks on mobile ad hoc networks
Blackhole Attck detection in AODV Protocol
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
Security in mobile ad hoc networks
Security in wireless sensor networks
A Combined Approach for Worm-Hole and Black-Hole Attack Detection in MANET
Study of security attacks in manet
Malicious attack detection and prevention in ad hoc network based on real tim...
Abdullah Mukhtar ppt
security in wireless sensor networks
Ad

Similar to A survey on complex wormhole attack in wireless (20)

PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PDF
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
PDF
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
PDF
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PDF
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
PDF
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
PPTX
Vampire attacks
PPTX
Vampireattacks 131109081959-phpapp02
PDF
Wormhole attack mitigation in manet a
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PDF
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PDF
Ijcatr04051009
PDF
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
PPTX
Various Security Attacks in mobile ad hoc networks
PDF
A novel approach for preventing black hole
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
Vampire attack a novel method for detecting vampire attacks in wireless ad –h...
Vampire attacks
Vampireattacks 131109081959-phpapp02
Wormhole attack mitigation in manet a
Elimination of wormhole attacker node in manet using performance evaluation m...
Malicious attack detection and prevention in ad hoc network based on real tim...
Performance Evaluation of Routing Protocol on AODV and DSR under Wormhole Attack
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC ...
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Ijcatr04051009
Performance Analysis of Routing Protocols (ADSDV, OLSR and TORA) in Wireless ...
Various Security Attacks in mobile ad hoc networks
A novel approach for preventing black hole
Ad

Recently uploaded (20)

PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
DOC
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPT
Ethics in Information System - Management Information System
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PPTX
newyork.pptxirantrafgshenepalchinachinane
PDF
Introduction to the IoT system, how the IoT system works
PDF
si manuel quezon at mga nagawa sa bansang pilipinas
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
Database Information System - Management Information System
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
The Evolution of Traditional to New Media .pdf
Uptota Investor Deck - Where Africa Meets Blockchain
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
t_and_OpenAI_Combined_two_pressentations
Layers_of_the_Earth_Grade7.pptx class by
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Rose毕业证学历认证,利物浦约翰摩尔斯大学毕业证国外本科毕业证
Mathew Digital SEO Checklist Guidlines 2025
Ethics in Information System - Management Information System
250152213-Excitation-SystemWERRT (1).ppt
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
newyork.pptxirantrafgshenepalchinachinane
Introduction to the IoT system, how the IoT system works
si manuel quezon at mga nagawa sa bansang pilipinas
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
Database Information System - Management Information System
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The Evolution of Traditional to New Media .pdf

A survey on complex wormhole attack in wireless

  • 1. Presented by : Farrukh Azad M. Jain and H. Kandwal Dept. Of Inf. Technol., Guru Gobind Singh Indraprastha Univ., New Delhi, India International Conference on Advances in Computing, Control, & Telecommunication Technologies, 2009. ACT '09. December 2009, pp. 555-558 IEEE 1
  • 2. Wormhole Attack  A malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally.  The tunnel can be established:  through an out-of-band hidden channel (e.g., a wired link)  packet encapsulation  High powered transmission 2
  • 3. Wormhole Attack Modes  Wormhole attacks can be launched using several modes, among these modes are  Wormhole using encapsulation  Wormhole Out-of-Band Channel  Wormhole with High Power Transmission  Wormhole using Packet Relay  Wormhole using Protocol Deviations 3
  • 4. Wormhole Using Encapsulation  A want to communicate with B, A broadcast RREQ.  X (malicious node) receive RREQ .  Encapsulation RREQ and send to Y (malicious node)  B select path A-X-Y-B (3 hops) , drop path A-C-D-E-B(4 Hops)  This prevents nodes from discovering legitimate paths that are more than two hops away. 4
  • 5. Wormhole Out-of-Band Channel  Out-of-Band Channel:  a long range directional wireless link  direct wired link  difficult to launch than the previous one since it needs specialized hardware capability. 5
  • 6. Wormhole with High Power Transmission  a single malicious node gets a RREQ(without the participation of a colluding node)  Broadcasts the request at a high power level  Any node that hears the high-power broadcast rebroadcasts it towards the destination. 6
  • 7. Wormhole Using Packet Relay  a malicious node relays packets between two distant nodes to convince them that they are neighbors 7
  • 8. Wormhole Using Protocol Deviations  During the RREQ forwarding, the nodes typically back off for a random amount of time before forwarding reduce MAC layer collisions.  A malicious node can create a wormhole by simply not complying with the protocol and broadcasting without backing off.  The purpose is to let the request packet it forwards arrive first at the destination. 8
  • 9. Classification Of Wormholes  Three types: closed, half open, and open.  Open Wormhole Attack:  the attackers include themselves in the RREQ packet header following the route discovery procedure.  Other nodes are aware that the malicious nodes lie on the path but they would think that the malicious nodes are direct neighbors. 9
  • 10. Classification Of Wormholes  Half open Wormhole Attack  One side of wormhole does not modify the packet and only another side modifies the packet, following the route discovery procedure. 10
  • 11. Classification Of Wormholes  Closed Wormhole Attack  The attackers do not modify the content of the packet, even the packet in a route discovery packet.  they simply tunnel the packet 11
  • 12. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 12 Advantages: Encapsulation Out of Band High Power Packet Relay Protocol Deviations smaller probability of a RREQ being discarded smaller probability of a RREQ being discarded smaller probability of a RREQ being discarded Control packet seems to arrive using the minimum number of Hops Min number of hops. Min number of hops. Min number of hops. Control packet Arrives faster Control packets arrive faster Two nodes think they are neighbors Control packet arrives faster. No need for colluding nodes
  • 13. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 13 Disadvantages Encapsulation Out of Band High Power Packet Relay Protocol Deviations Resources and time consumption in packet encapsulation specialized hardware capability Needs power spend resources for Processing RREQ packets and hiding their IDs collisions occurrence time difference in control packets arrival could be very remarkable. difference be noticed high speed
  • 14. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 14 Challenges to be faced Encapsulation Out of Band High Power Packet Relay Protocol Deviations having a predetermined Path to colluding node special Hardware Power adjustments are needed proper positions for malicious nodes Collisions Hiding malicious node Names intermediate Node can checks the contents of the sent Packet Optimum number of relaying Communication between relaying nodes
  • 15. Comparison Between The Wormhole Attack Modes From An Attacker’s Perspective 15 Possible solutions for challenges Encapsulation Out of Band High Power Packet Relay Protocol Deviations having a predetermined Path to colluding node special Hardware Power adjustments are needed proper positions for malicious nodes Collisions Hiding malicious node Names intermediate Node can checks the contents of the sent Packet Optimum number of relaying Communication between relaying nodes send regular RREQ packets to establish paths. complex attacks will solve this problem different power levels primary network topology. Start by having a large number of relaying nodes and then minimize them to get the optimum performance. A priority or round robin scheme for malicious nodes packets could be used
  • 16. References [1] C. Karlof and D. Wagner, "Secure Routing in Sensor Networks: Attacks and Countermeasures," in 1st IEEE International Workshop on Sensor Network Protocols and Applications (WSNA), 2003, pp. 113-127. [2] Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks," in 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), 2003, pp. 1976-1986. [3] L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," in Network and Distributed System Security Symposium (NDSS), San Diego.2004 , [4] I. Khalil, "LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks," in DSN '05: Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN'05), 2005, pp. 612-621. [5] K. Issa, B. Saurabh, and B. S. Ness, "LiteWorp: Detection and Isolation of the Wormhole Attack in Static Multihop Wireless Networks," The International Journal of Computer and Telecommunications Networking vol. 51, pp. 3750 3772, 2007. [6] W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending Against Wormhole Attacks in Mobile Ad Hoc Networks," Wiley Journal on Wireless Communications and Mobile Computing, vol. 5, pp. 1- 21, 2005. [7] K. Lee, H. Jeon, and D. Kim, "Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks," in New Technologies, Mobility and Security: Springer Netherlands, 2007, pp. 361-372. 16
  • 17. 17