• Mar 31, 2016 News!Vol.5, No.5 has been indexed by EI (Inspec).   [Click]
  • Aug 02, 2016 News!IJIEE Vol. 6, No. 4 issue has been published online! 10 papers which cover 3 specific areas are published in this issue.   [Click]
  • May 10, 2016 News!Papers published in Vol.6, No.3 have all received dois from Crossref.
General Information

Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2012 Vol.2(3): 300-306 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2012.V2.103

An Effective Method of Security Against Wormhole Attack

Mohamed Amine Ferrag and Mehdi Nafaa
Abstract—A major problem facing researchers today in the field of ad hoc networks is safety and preservation of the integrity of such networks. Among the many attacks recorded in the literature, wormhole attack remains a severe attack and not completely solved, particularly in ad hoc network configuration where OLSR is used as routing protocol. We have chosen the OLSR routing protocol because it is the most widely used ad hoc community. In general the attacker can delete, modify, copy control messages to send false messages. Our scheme consists of detecting the type of attack, the checks and then ends with alert the nodes of mobile social network. These three elements is based on the addition of five messages "Hreq, Hrep, HAlert, Probing and ACKprob" in the OLSR protocol. For the exchange of a package of Hreq, Hrep and HAlert; and to provide authentication as well confidentiality. We have proposed the dual use of public key encryption; the message will be decrypted only by the true recipient and to ensure safe exchange of a package of Probing and ACKprob, we proposed an architecture through the use of RSA and MD5 to sign messages. The proposed solution is easy to deploy and requires no time synchronization or location information nor does it require any special equipment or complex calculation. The performances of this approach show a high detection rate under various scenarios.

Index Terms—Wireless ad hoc networks, routing protocols, olsr, security, wormhole attack, MD5, RSA.

M. A. Ferrag is PhD student in networks and computer security at University Badji Mokhtar, ANNABA, and Algeria (e-mail: mohamed.amine.ferrag@gmail.com).
M. Nafaa is currently teaches in the Departement of Computer Science University Badji Mokhtar, Annaba, Algeria (email: mehdi.nafaa@gmail.com).


Cite: Mohamed Amine Ferrag and Mehdi Nafaa, "An Effective Method of Security Against Wormhole Attack," International Journal of Information and Electronics Engineering vol. 2, no. 3, pp. 300-306, 2012.

Copyright © 2008-2016. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net