Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks

被引:5
作者
Shi, Fei [1 ]
Jin, Dongxu [1 ]
Liu, Weijie [2 ]
Song, JooSeok [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul, South Korea
[2] Yonsei Univ, Dept Informat & Ind Engn, Seoul, South Korea
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
基金
新加坡国家研究基金会;
关键词
wireless ad hoc networks; wormhole; detection; location; time-based;
D O I
10.1109/TrustCom.2011.240
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
引用
收藏
页码:1721 / 1726
页数:6
相关论文
共 50 条
[41]   Multicast Capacity of Wireless Ad Hoc Networks [J].
Li, Xiang-Yang .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (03) :950-961
[42]   Adapting BitTorrent to wireless ad hoc networks [J].
Sbai, Mohamed Karim ;
Barakat, Chadi ;
Choi, Jaeyoung ;
Al Hamra, Anwar ;
Turletti, Thierry .
AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 :189-203
[43]   Geometric spanners for wireless ad hoc networks [J].
Alzoubi, K ;
Li, XY ;
Wang, Y ;
Wan, PJ ;
Frieder, O .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2003, 14 (04) :408-421
[44]   Modeling Interference in Wireless Ad Hoc Networks [J].
Cardieri, Paulo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2010, 12 (04) :551-572
[45]   A Discounted Stochastic Game Approach to Intrusion Detection in Wireless Ad Hoc Networks [J].
Moosavi, Hussein ;
Bui, Francis Minhthang .
2014 IEEE FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2014, :536-541
[46]   Adaptable Misbehavior Detection and Isolation in Wireless Ad Hoc Networks Using Policies [J].
Duque, Oscar F. Gonzalez ;
Hadjiantonis, Antonis M. ;
Pavlou, George ;
Howarth, Michael .
2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009) VOLS 1 AND 2, 2009, :242-+
[47]   Virtual node based adaptive routing in wireless ad hoc networks [J].
Li, Gang ;
Sun, Hongmei .
FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2009, 3 (04) :535-542
[48]   A Cooperative MAC Protocol Based on 802.11 in Wireless Ad hoc Networks [J].
Sheu, Jang-Ping ;
Chang, Jung-Tzu ;
Ma, Chuang ;
Leong, Cheok-Pan .
2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, :416-421
[49]   Channel Reservation Based on Contention and Interference in Wireless Ad hoc Networks [J].
Zhang, Xinming ;
Dai, Zhilong ;
Zhu, Haitao .
2014 23RD INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2014,
[50]   Mobility-Based Topology Control for Wireless Ad Hoc Networks [J].
Seol, Jae-Young ;
Kim, Seong-Lyun .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (06) :1443-1450