Transmission time-based mechanism to detect wormhole attacks

被引:12
作者
Van Phuong, Tran [1 ]
Canh, Ngo Trong [1 ]
Lee, Young-Koo [1 ]
Lee, Sungyoung [1 ]
Lee, Heejo [2 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Seoul, South Korea
[2] Korea Univ, Dept Comp Sci & Engn, Seoul, South Korea
来源
2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS | 2007年
关键词
intrusion detection; wonnhole attacks; wireless Ad Hoc networks; AODV;
D O I
10.1109/APSCC.2007.64
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.
引用
收藏
页码:172 / +
页数:3
相关论文
共 18 条
[1]  
[Anonymous], P 6 ANN INT C MOB CO
[2]  
[Anonymous], 2002, AD HOC MOBILE WIRELE
[3]  
Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128
[4]  
Chiu HS, 2006, INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, P149
[5]  
HU L, 2004, P IEEE S NETW DISTR
[6]  
HU Y, 2003, P IEEE C COMP COMM I
[7]  
Karlof C., 2003, AD HOC NETW, P293, DOI DOI 10.1016/S1570-8705(03)00008-8
[8]   LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks [J].
Khalil, I ;
Bagchi, S ;
Shroff, NB .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :612-621
[9]   Intrusion detection in wireless ad hoc networks [J].
Mishra, A ;
Nadkarni, K ;
Patcha, A .
IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01) :48-60
[10]  
PHUONG TV, 2006, ANOMALY DETECTION AL, P735