Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach

被引:0
作者
Lazos, L [1 ]
Poovendran, R [1 ]
Meadows, C [1 ]
Syverson, P [1 ]
Chang, LW [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
来源
2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF. | 2005年
关键词
wormhole; security; vulnerability; ad hoc networks; geometric random graph;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of network protocols without compromising any cryptographic quantity or network node. Making use of geometric random induced by the communication range constraint of the nodes, present the necessary and sufficient conditions for detecting defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We our work is the first one to present analytical calculation of probabilities of detection. We also present simulation results illustrate our theory.
引用
收藏
页码:1193 / 1199
页数:7
相关论文
共 50 条
[31]   A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks [J].
Meghdadi, Majid ;
Ozdemir, Suat ;
Gueler, Inan .
IETE TECHNICAL REVIEW, 2011, 28 (02) :89-102
[32]   Distributed Detection of Wormhole Attacks in Wireless Sensor Networks [J].
de Graaf, Rennie ;
Hegazy, Islam ;
Horton, Jeffrey ;
Safavi-Naini, Reihaneh .
AD HOC NETWORKS, 2010, 28 :208-+
[33]   Improving QoS and security in wireless ad hoc networks by mitigating the impact of selfish behaviors: a game-theoretic approach [J].
Szott, Szymon ;
Natkaniec, Marek ;
Pach, Andrzej R. .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (04) :509-522
[34]   Game-theoretic approach to capacity and stability evaluations of decentralized adaptive route selections in wireless ad hoc networks [J].
Yamamoto, K ;
Yoshida, S .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) :1009-1016
[35]   Routing in wireless ad hoc networks [J].
Rishiwal, Vinay ;
Yadav, Mano .
INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2012, 7 (02) :108-119
[36]   Flooding in wireless ad hoc networks [J].
Lim, H ;
Kim, C .
COMPUTER COMMUNICATIONS, 2001, 24 (3-4) :353-363
[37]   Minimising Black Hole Attacks to Enhance Security in Wireless Mobile Ad Hoc Networks [J].
Chengetanai, Gibson .
2018 IST-AFRICA WEEK CONFERENCE (IST-AFRICA), 2018,
[38]   Defense against injecting traffic attacks in wireless mobile ad-hoc networks [J].
Yu, Wei ;
Liu, K. J. Ray .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2007, 2 (02) :227-239
[39]   A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks [J].
Kim, Hyojin ;
de Oliveira, Ruy ;
Bhargava, Bharat ;
Song, JooSeok .
WIRELESS PERSONAL COMMUNICATIONS, 2013, 70 (04) :1339-1351
[40]   Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs) [J].
Al-kahtani, Mohammed Saeed .
6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS'2012), 2012,