TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks

被引:0
|
作者
Van Tran, Phuong [1 ]
Hung, Le Xuan [1 ]
Lee, Young-Koo [1 ]
Lee, Sungyung [1 ]
Lee, Heejo [2 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Korea Univ, Dept Comp Engn & Sci, Seoul, South Korea
来源
2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3 | 2007年
关键词
intrusion defection; wormhole attacks; Wireless Ad Hoc Networks; AODV;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [31] Energy-Efficient Routing for Connection-Oriented Traffic in Wireless Ad-Hoc Networks
    Anastassios Michail
    Anthony Ephremides
    Mobile Networks and Applications, 2003, 8 : 517 - 533
  • [32] Energy-efficient routing for connection-oriented traffic in wireless ad-hoc networks
    Michail, A
    Ephremides, A
    MOBILE NETWORKS & APPLICATIONS, 2003, 8 (05) : 517 - 533
  • [33] Transmission time-based mechanism to detect wormhole attacks
    Van Phuong, Tran
    Canh, Ngo Trong
    Lee, Young-Koo
    Lee, Sungyoung
    Lee, Heejo
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 172 - +
  • [34] Energy efficient routing in wireless ad hoc networks
    Senouci, SM
    Pujolle, G
    2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7, 2004, : 4057 - 4061
  • [35] Security Mechanism against Flood Attacks in Ad Hoc Networks
    Wang, Xi-Jie
    Hu, Shun-Yi
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 5902 - 5905
  • [36] Infrastructure-based MAC in wireless mobile ad-hoc networks
    You, TT
    Hassanein, H
    LCN 2002: 27TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2002, : 821 - 830
  • [37] Minimum-Energy Broadcasting for Cross Wireless Ad-Hoc Networks
    Ataei, Mohammad R.
    Banihashemi, Amir H.
    Kunz, Thomas
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 6577 - 6583
  • [38] Finding minimum energy disjoint paths in wireless ad-hoc networks
    Srinivas, A
    Modiano, E
    WIRELESS NETWORKS, 2005, 11 (04) : 401 - 417
  • [39] Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks
    Anand Srinivas
    Eytan Modiano
    Wireless Networks, 2005, 11 : 401 - 417
  • [40] Risk-based routing protocol for wireless ad-hoc networks
    Alarifi, A
    Du, WL
    ICWN '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS, 2005, : 161 - 165