Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach

被引:0
作者
Lazos, L [1 ]
Poovendran, R [1 ]
Meadows, C [1 ]
Syverson, P [1 ]
Chang, LW [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
来源
2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF. | 2005年
关键词
wormhole; security; vulnerability; ad hoc networks; geometric random graph;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of network protocols without compromising any cryptographic quantity or network node. Making use of geometric random induced by the communication range constraint of the nodes, present the necessary and sufficient conditions for detecting defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We our work is the first one to present analytical calculation of probabilities of detection. We also present simulation results illustrate our theory.
引用
收藏
页码:1193 / 1199
页数:7
相关论文
共 50 条
  • [21] Game-theoretic approach for concurrent transmission in a single-channel for wireless Ad Hoc networks
    Li X.-J.
    Chen C.
    Qiu H.-B.
    Mo W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2010, 37 (05): : 789 - 794+800
  • [22] An evolutionary approach to routing in wireless ad hoc networks
    Sreenivas, Hiranmayi
    Ali, HeshamH.
    IASTED International Conference on Wireless Networks and Emerging Technologies, 2005, : 57 - 64
  • [23] Analysis of Wormhole Attacks in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 2, 2018, 708 : 33 - 42
  • [24] Prevention of Wormhole Attacks in Wireless Sensor Networks
    Aldhobaiban, Dema
    Elleithy, Khaled
    Almazaydeh, Laiali
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 287 - 291
  • [25] THE EFFECT OF VAMPIRE ATTACKS ON DISTANCE VECTOR ROUTING PROTOCOLS FOR WIRELESS AD HOC SENSOR NETWORKS
    Nisha, A. Sanofer
    Vaishali, V.
    Shivaranjani, T.
    Subathra, P.
    2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM), 2016, : 587 - 594
  • [26] Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution
    Hamieh, Ali
    Ben-Othman, Jalel
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 4831 - 4836
  • [27] A novel intrusion detection approach for wireless ad hoc networks
    Nadkarni, K
    Mishra, A
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 831 - 836
  • [28] Immune Inspired Approach for Securing Wireless Ad hoc Networks
    Mohamed, Yasir Abdelgadir
    Abdullah, Azween B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (07): : 206 - 212
  • [29] Connectionless protocol: a localised approach to wireless ad hoc networks
    Ho, Yao H.
    Ho, Ai Hua
    Hua, Kien A.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (01) : 21 - 35
  • [30] Variants of Wormhole Attacks and Their Impact in Wireless Sensor Networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 637 - 642