TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks

被引:0
|
作者
Van Tran, Phuong [1 ]
Hung, Le Xuan [1 ]
Lee, Young-Koo [1 ]
Lee, Sungyung [1 ]
Lee, Heejo [2 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Korea Univ, Dept Comp Engn & Sci, Seoul, South Korea
来源
2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3 | 2007年
关键词
intrusion defection; wormhole attacks; Wireless Ad Hoc Networks; AODV;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.
引用
收藏
页码:593 / +
页数:2
相关论文
共 50 条
  • [42] Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks
    Gripsy, J. Viji
    Kanchana, K. R.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2023, 16 (02) : 92 - 98
  • [43] Towards throughput and delay optimal routing for wireless ad-hoc networks
    Gupta, Parul
    Javidi, Tara
    CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, 2007, : 249 - 254
  • [44] On the Multicast Throughput Capacity of Network Coding in Wireless Ad-hoc Networks
    Karande, Shirish
    Wang, Zheng
    Sadjadpour, Hamid R.
    Garcia-Luna-Aceves, J. J.
    2ND ACM INTERNATIONAL WORKSHOP ON FOUNDATIONS OF WIRELESS AD HOC AND SENSOR NETWORKING AND COMPUTING, 2009, : 21 - 27
  • [45] Throughput Maximization for Multipath Secure Transmission in Wireless Ad-Hoc Networks
    Bai, Lin
    Han, Pengfei
    Wang, Jingjing
    Wang, Jiaxing
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2024, 72 (11) : 6810 - 6821
  • [46] An Approach to Prevent Gray-hole Attacks on Mobile ad-hoc Networks
    Sachan, Kusumlata
    Lokhande, Manisha
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [47] A control packet minimized routing protocol for ad-hoc wireless networks
    Hong, Youn-Sik
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 907 - 919
  • [48] A power-based clustering algorithm for wireless ad-hoc networks
    Huang, TC
    Shiu, LC
    Chen, YF
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2004, 3207 : 591 - 600
  • [49] EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks
    Kancharakuntla, Deepika
    El-Ocla, Hosam
    ELECTRONICS, 2022, 11 (21)
  • [50] Energy efficient route discovery for mobile HCI in Ad-Hoc networks
    Shin, Kwonseung
    Park, Kwangjin
    Chung, Min Young
    Choo, Hyunseung
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: INTERACTING IN INFORMATION ENVIRONMENTS, PT 2, PROCEEDINGS, 2007, 4558 : 635 - +