Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks

被引:5
|
作者
Shi, Fei [1 ]
Jin, Dongxu [1 ]
Liu, Weijie [2 ]
Song, JooSeok [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
[2] Yonsei Univ, Dept Informat & Ind Engn, Seoul, South Korea
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
新加坡国家研究基金会;
关键词
wireless ad hoc networks; wormhole; detection; location; time-based;
D O I
10.1109/TrustCom.2011.240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
引用
收藏
页码:1721 / 1726
页数:6
相关论文
共 50 条
  • [1] A Novel Scheme for Preventing Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Song, JooSeok
    Liu, Weijie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 15 - 20
  • [2] DelPHI: Wormhole detection mechanism for ad hoc wireless networks
    Chiu, Hon Sun
    Lui, King-Shan
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 149 - +
  • [3] Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
    Lazos, L
    Poovendran, R
    Meadows, C
    Syverson, P
    Chang, LW
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1193 - 1199
  • [4] TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks
    Van Tran, Phuong
    Hung, Le Xuan
    Lee, Young-Koo
    Lee, Sungyung
    Lee, Heejo
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 593 - +
  • [5] Transmission time-based mechanism to detect wormhole attacks
    Van Phuong, Tran
    Canh, Ngo Trong
    Lee, Young-Koo
    Lee, Sungyoung
    Lee, Heejo
    2ND IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 172 - +
  • [6] Detection of wormhole attacks in mobility-based wireless sensor networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay K.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (02) : 147 - 156
  • [7] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [8] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [9] Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks
    Jagadeesan Srinivasan
    Scientific Reports, 15 (1)
  • [10] Location Estimation of an Intruder in Wireless Ad Hoc Networks
    Debono, C. J.
    Sammut, E.
    2008 IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1 AND 2, 2008, : 152 - 156