Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach

被引:0
作者
Lazos, L [1 ]
Poovendran, R [1 ]
Meadows, C [1 ]
Syverson, P [1 ]
Chang, LW [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
来源
2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF. | 2005年
关键词
wormhole; security; vulnerability; ad hoc networks; geometric random graph;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of network protocols without compromising any cryptographic quantity or network node. Making use of geometric random induced by the communication range constraint of the nodes, present the necessary and sufficient conditions for detecting defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We our work is the first one to present analytical calculation of probabilities of detection. We also present simulation results illustrate our theory.
引用
收藏
页码:1193 / 1199
页数:7
相关论文
共 50 条
[41]   Covert channels in ad-hoc wireless networks [J].
Li, Song ;
Ephremides, Anthony .
AD HOC NETWORKS, 2010, 8 (02) :135-147
[42]   Anonymous routing for mobile wireless ad hoc networks [J].
Durresi, Arjan ;
Paruchuri, Vamsi ;
Durres, Mimoza ;
Barolli, Leonard .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2007, 3 (01) :105-117
[43]   Security in wireless ad-hoc networks - A survey [J].
Di Pietro, R. ;
Guarino, S. ;
Verde, N. V. ;
Domingo-Ferrer, J. .
COMPUTER COMMUNICATIONS, 2014, 51 :1-20
[44]   Information theoretic framework of trust modeling and evaluation for ad hoc networks [J].
Sun, YL ;
Yu, W ;
Han, Z ;
Liu, KJR .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :305-317
[45]   A cross-layer game theoretic solution for interference mitigation in wireless ad hoc networks [J].
Mahmood, Hasan ;
Comaniciu, Cristina .
MILCOM 2006, VOLS 1-7, 2006, :2269-+
[46]   SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks [J].
Nsaif, Saad Allawi ;
Park, Sang Yoon ;
Rhee, Jong Myung .
2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, :172-175
[47]   SRAD: A Novel Approach to Seamless Routing for Wireless Ad Hoc Networks [J].
Nsaif, Saad Allawi ;
Park, Sang Yoon ;
Rhee, Jong Myung .
2021 23RD INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT 2021): ON-LINE SECURITY IN PANDEMIC ERA, 2021, :172-175
[48]   Wireless IP ad hoc networks: The IST MIND project approach [J].
Mitjana, E ;
Wisely, D ;
Mohr, W .
5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, :237-241
[49]   Information-theoretic upper bounds on the capacity of large extended ad hoc wireless networks [J].
Lévêque, O ;
Telatar, IE .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (03) :858-865
[50]   Distributed Power Control For Wireless Ad Hoc Networks: A Game-Theoretic Approach Based On Best-Response Functions [J].
Kucera, Stepan ;
Yamamoto, Koji ;
Yoshida, Susumu .
2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, :1172-1176