Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks

被引:5
作者
Shi, Fei [1 ]
Jin, Dongxu [1 ]
Liu, Weijie [2 ]
Song, JooSeok [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
[2] Yonsei Univ, Dept Informat & Ind Engn, Seoul, South Korea
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
新加坡国家研究基金会;
关键词
wireless ad hoc networks; wormhole; detection; location; time-based;
D O I
10.1109/TrustCom.2011.240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
引用
收藏
页码:1721 / 1726
页数:6
相关论文
共 50 条
[21]   MRWDPP: Multipath Routing Wormhole Detection and Prevention Protocol in Mobile Ad Hoc Networks [J].
Ahuja, Ravinder ;
Saini, Vinit ;
Banga, Alisha .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 :513-522
[22]   An Intrusion Detection Architecture for Clustered Wireless Ad Hoc Networks [J].
Sen, Jaydip .
2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, :202-207
[23]   Duplicate address detection in wireless ad hoc networks using wireless nature [J].
Chen, Yu ;
Fleury, Eric .
NETWORKING 2006: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2006, 3976 :415-426
[24]   Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks [J].
Patel, Manish ;
Aggarwal, Akshai ;
Chaubey, Nirbhay .
PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 :637-642
[25]   Overlay networks for wireless ad hoc networks [J].
Scheideler, Christian .
WIRELESS COMMUNICATIONS, 2007, 143 :237-258
[26]   Queuing schedule for location based on wireless Ad-hoc networks with D-cover algorithm [J].
Wei W. ;
Yang H. ;
Wang H. ;
Li R.-J. ;
Shi W. .
International Journal of Digital Content Technology and its Applications, 2011, 5 (01) :356-363
[27]   Game model for detecting cross-layer attacks in wireless ad hoc networks [J].
Wang J. ;
Liu X. ;
Jiang S. .
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2022, 44 (01) :114-121
[28]   Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network [J].
Liu, Jun ;
Chen, Huiting ;
Zhen, Zhong ;
Sha, Mingbo .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 :147-154
[29]   Distance and Cooperation Based Broadcast in Wireless Ad Hoc Networks [J].
Liu, Xinxin ;
Yu, Yanping ;
Zheng, Yuanyan ;
Ning, Dongsheng ;
Wang, Xiaoyan .
TESTBEDS AND RESEARCH INFRASTRUCTURES FOR THE DEVELOPMENT OF NETWORKS AND COMMUNITIES, TRIDENTCOM 2016, 2017, 177 :168-178
[30]   A Novel Method for Scheduling of Wireless Ad Hoc Networks in Polynomial Time [J].
Kose, Alper ;
Gokcesu, Hakan ;
Evirgen, Noyan ;
Gokcesu, Kaan ;
Medard, Muriel .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2021, 20 (01) :468-480