DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS

被引:28
作者
Ren, Yanzhi [1 ]
Chuah, Mooi Choo [2 ]
Yang, Jie [1 ]
Chen, Yingying [1 ]
机构
[1] Stevens Inst Technol, Dept Elect & Comp Engn, Hoboken, NJ 07030 USA
[2] Lehigh Univ, Bethlehem, PA 18015 USA
关键词
Peer to peer computing; Ad hoc networks; Topology; Routing; Routing protocols; Network topology; Relays;
D O I
10.1109/MWC.2010.5601956
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Delay-tolerant networks are especially useful in providing mission-critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which relays them locally into the network. Wormhole attacks are a severe threat to normal network operation in DTNs. In this article we describe various methods that have been developed to detect wormhole attacks. However, most of them cannot work efficiently in DTNs. To detect the presence of a wormhole attack, we propose a detection mechanism that exploits the existence of a forbidden topology in the network. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that the proposed method can detect wormhole attacks efficiently and effectively in DTNs.
引用
收藏
页码:36 / 42
页数:7
相关论文
共 10 条
  • [1] [Anonymous], P ASPLOS
  • [2] BROCH J, 1998, P 4 ACM IEEE MOBICOM
  • [3] CAPKUN S, 2003, P ACM SASN
  • [4] Farrell S., 2006, Delay and Disruption Tolerant Networking
  • [5] Hu L, 2003, NETWORK DISTRIB SYS
  • [6] Hu Yih-Chun B., 2003, P IEEE INFOCOM
  • [7] Lindgren Anders., 2003, ACM SIGMOBILE MOBILE
  • [8] Detecting wormhole attacks in wireless networks using connectivity information
    Maheshwari, Ritesh
    Gao, Jie
    Das, Samir R.
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 107 - +
  • [9] REN Y, 2009, MITIGATION SCHEMES A
  • [10] ZHANG Z, 2007, WIRELESS COMMUN MOBI, V7