Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach

被引:0
|
作者
Lazos, L [1 ]
Poovendran, R [1 ]
Meadows, C [1 ]
Syverson, P [1 ]
Chang, LW [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
来源
2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF. | 2005年
关键词
wormhole; security; vulnerability; ad hoc networks; geometric random graph;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of network protocols without compromising any cryptographic quantity or network node. Making use of geometric random induced by the communication range constraint of the nodes, present the necessary and sufficient conditions for detecting defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We our work is the first one to present analytical calculation of probabilities of detection. We also present simulation results illustrate our theory.
引用
收藏
页码:1193 / 1199
页数:7
相关论文
共 50 条
  • [1] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [2] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59
  • [3] PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
    Azer, Marianne Amir
    El-Kassas, Sherif Mohammed
    El-Soudani, Mady Saiid
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 69 - +
  • [4] Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Jin, Dongxu
    Liu, Weijie
    Song, JooSeok
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1721 - 1726
  • [5] DelPHI: Wormhole detection mechanism for ad hoc wireless networks
    Chiu, Hon Sun
    Lui, King-Shan
    INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 149 - +
  • [6] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [7] Preventing resource exhaustion attacks in ad hoc networks
    Tanabe, Masao
    Aida, Masaki
    EIGHTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2007, : 543 - +
  • [8] Securing DSR against wormhole attacks in multirate ad hoc networks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 582 - 592
  • [9] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [10] A GAME THEORETIC APPROACH FOR ENERGY OPTIMIZATION IN CLUSTERED WIRELESS AD HOC SENSOR NETWORKS
    Saleem, Asad
    Asfandyar, Malik
    Mehmood, Hasan
    INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES, 2019, 10 (13):