TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks

被引:0
|
作者
Van Tran, Phuong [1 ]
Hung, Le Xuan [1 ]
Lee, Young-Koo [1 ]
Lee, Sungyung [1 ]
Lee, Heejo [2 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Korea Univ, Dept Comp Engn & Sci, Seoul, South Korea
来源
2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3 | 2007年
关键词
intrusion defection; wormhole attacks; Wireless Ad Hoc Networks; AODV;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [1] A Novel Scheme for Preventing Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Song, JooSeok
    Liu, Weijie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 15 - 20
  • [2] Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks
    Jagadeesan Srinivasan
    Scientific Reports, 15 (1)
  • [3] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [4] TimSim: An Efficient Simulator for Wireless Ad-hoc Networks
    Xia, Hui
    Yu, Jia
    Wang, Guo-Dong
    Pan, Zhen-Kuan
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (04): : 301 - 313
  • [5] An Approach to detect Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [6] Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Jin, Dongxu
    Liu, Weijie
    Song, JooSeok
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1721 - 1726
  • [7] Bayesian inference approach for establishing efficient routes in wireless ad-hoc networks
    Alkhabbaz, Wafa
    Alasaad, Amr
    Alshaye, Meshal
    TELECOMMUNICATION SYSTEMS, 2017, 65 (03) : 387 - 405
  • [8] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04) : 483 - 503
  • [9] Securing DSR against wormhole attacks in multirate ad hoc networks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 582 - 592
  • [10] Bayesian inference approach for establishing efficient routes in wireless ad-hoc networks
    Wafa Alkhabbaz
    Amr Alasaad
    Meshal Alshaye
    Telecommunication Systems, 2017, 65 : 387 - 405