TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks

被引:0
|
作者
Van Tran, Phuong [1 ]
Hung, Le Xuan [1 ]
Lee, Young-Koo [1 ]
Lee, Sungyung [1 ]
Lee, Heejo [2 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Korea Univ, Dept Comp Engn & Sci, Seoul, South Korea
来源
2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3 | 2007年
关键词
intrusion defection; wormhole attacks; Wireless Ad Hoc Networks; AODV;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [21] Improved Radio Propagation Models for Wireless Ad-Hoc Networks
    Khan, Adnan
    Constantinou, C. Costas
    Stojmenovic, Ivan
    IPSI BGD TRANSACTIONS ON INTERNET RESEARCH, 2014, 10 (01): : 15 - 22
  • [22] cTEx - A Configurable Topology Explorer for Wireless Ad-hoc Networks
    Kohlstruck, Christopher
    Gotzhein, Reinhard
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [23] Scaling laws and operation of wireless ad-hoc and sensor networks
    Aeron, S
    Venkatesh, S
    PROCEEDINGS OF THE 2003 IEEE WORKSHOP ON STATISTICAL SIGNAL PROCESSING, 2003, : 367 - 370
  • [24] Efficient topology control for ad-hoc wireless networks with non-uniform transmission ranges
    Li, XY
    Song, WZ
    Wang, Y
    WIRELESS NETWORKS, 2005, 11 (03) : 255 - 264
  • [25] Efficient Topology Control for Ad-Hoc Wireless Networks with Non-Uniform Transmission Ranges
    Xiang-Yang Li
    Wen-Zhan Song
    Yu Wang
    Wireless Networks, 2005, 11 : 255 - 264
  • [26] JAM: Mitigating Jellyfish Attacks in Wireless Ad Hoc Networks
    Samad, Fahad
    Abu Ahmed, Qassem
    Shaikh, Asadullah
    Aziz, Abdul
    EMERGING TRENDS AND APPLICATIONS IN INFORMATION COMMUNICATION TECHNOLOGIES, 2012, 281 : 432 - +
  • [27] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [28] Variable Transmission Power Control in Wireless Ad-hoc Networks
    Ifedayo, Akinsolu Ojuetimi
    Dlodlo, Mqhele
    PROCEEDINGS OF THE 2015 12TH IEEE AFRICON INTERNATIONAL CONFERENCE - GREEN INNOVATION FOR AFRICAN RENAISSANCE (AFRICON), 2015,
  • [29] Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
    Su, Ming-Yang
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2011, 7 (04) : 246 - 260
  • [30] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59