An end-to-end detection of wormhole attack in wireless ad-hoc networks

被引:22
|
作者
Wang, Xia [1 ]
Wong, Johnny [1 ]
机构
[1] Iowa State Univ Sci & Technol, Dept Comp Sci, Ames, IA 50011 USA
关键词
D O I
10.1061/40952(317)39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time over each link during the route establishment, which requires special hardware or causes overhead on all links even though only one link on each route could be affected by a wormhole attack. In this article, we propose an end-to-end detection of wormhole attack (EDWA) in wireless ad-hoc networks. We first present the wormhole detection which is based on the smallest hop count estimation between source and destination. If the hop count of a received shortest route is much smaller than the estimated value an alert of wormhole attack is raised at the source node. Then the source node will start a wormhole TRACING procedure to identify the two end points of the wormhole. Finally, a legitimate route is selected for data communication. Both our analysis and simulation results show that the end-to-end wormhole detection method is effective when the source and destination are not too far away.
引用
收藏
页码:39 / +
页数:2
相关论文
共 50 条
  • [1] Enhanced end-to-end TDMA for wireless ad-hoc networks
    Vergados, D. J.
    Koutsoglannaki, M.
    Vergados, D. D.
    Loumos, V.
    Pantazis, N.
    2007 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2007, : 1191 - 1196
  • [2] End-to-end QoS routing in physically hierarchical wireless ad-hoc networks
    Lee, KY
    Hwang, JB
    Ryoo, J
    VTC2005-SPRING: 2005 IEEE 61ST VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5, PROCEEDINGS, 2005, : 2488 - 2492
  • [3] End-to-end performance improvements for multi-hop ad-hoc wireless networks
    Choi, W
    Lee, Y
    Rhee, SH
    Chung, K
    Lee, JY
    Cho, JW
    Cho, WD
    SECOND IEEE WORKSHOP ON SOFTWARE TECHNOLOGIES FOR FUTURE EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2004, : 53 - 57
  • [4] Monitoring end-to-end connectivity in mobile ad-hoc networks
    Badonnel, R
    State, R
    Festor, O
    NETWORKING - ICN 2005, PT 2, 2005, 3421 : 83 - 90
  • [5] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [6] On increasing end-to-end throughput in wireless ad hoc networks
    Li, ZP
    Li, BC
    2005 2nd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine), 2005, : 272 - 280
  • [7] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [8] On increasing end-to-end throughput in wireless ad hoc networks
    Li, Zongpeng
    Li, Baochun
    Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, Qshine 2005, 2005, 2005
  • [9] End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks
    Sarkar, S
    Tassiulas, L
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2005, 50 (09) : 1246 - 1259
  • [10] End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks
    Sarkar, S
    Tassiulast, L
    42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, 2003, : 564 - 569