Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks

被引:5
作者
Shi, Fei [1 ]
Jin, Dongxu [1 ]
Liu, Weijie [2 ]
Song, JooSeok [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
[2] Yonsei Univ, Dept Informat & Ind Engn, Seoul, South Korea
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
新加坡国家研究基金会;
关键词
wireless ad hoc networks; wormhole; detection; location; time-based;
D O I
10.1109/TrustCom.2011.240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
引用
收藏
页码:1721 / 1726
页数:6
相关论文
共 50 条
[31]   Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks [J].
Stafrace, Stefan K. ;
Antonopoulos, Nick .
COMPUTER COMMUNICATIONS, 2010, 33 (05) :619-638
[32]   Enhanced intrusion detection algorithm for NTP based routing protocol for wireless ad hoc networks [J].
Radha, S ;
Rajkumar, S .
IETE JOURNAL OF RESEARCH, 2005, 51 (05) :353-359
[33]   Reactive Protocols Analysis with Wormhole Attack in Ad-hoc Networks [J].
Garg, Gaurav ;
Kaushal, Sakshi ;
Sharma, Akashdeep .
2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
[34]   Rigid body based location technology for ad hoc sensor networks [J].
Niu, Feng ;
Kyperountas, Spyros ;
Shi, Qicai ;
Huang, Jian .
PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, :926-931
[35]   Detection of Wormhole Attack in Wireless Sensor Networks [J].
Yadav, Jyoti ;
Kumar, Mukesh .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT, ICT4SD 2015, VOL 1, 2016, 408 :243-250
[36]   An Efficient Location and Detection (ELD) based Mobile ad-hoc networks implementation with Embedded Systems [J].
Rajaram, M. ;
Sumathy, V. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (02) :103-114
[37]   Wormhole Attack Detection in Wireless Sensor Networks [J].
Bendjima, Mostefa ;
Feham, Mohammed .
PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, :1319-1326
[38]   Malware Propagations in Wireless Ad Hoc Networks [J].
Liu, Bo ;
Zhou, Wanlei ;
Gao, Longxiang ;
Zhou, HaiBo ;
Luan, Tom H. ;
Wen, Sheng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (06) :1016-1026
[39]   Placing and maintaining a core node in wireless ad hoc networks [J].
Dvir, A. ;
Segal, M. .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (06) :826-842
[40]   Localized Spanners for Ad Hoc Wireless Networks [J].
Damian, Mirela ;
Pemmaraju, Sriram V. .
AD HOC & SENSOR WIRELESS NETWORKS, 2010, 9 (3-4) :305-328