Topological comparison-based wormhole detection for MANET
Access Status
Authors
Date
2014Type
Metadata
Show full item recordCitation
Source Title
Additional URLs
ISSN
School
Collection
Abstract
Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormhole attack can be further divided into two categories: traditional wormhole attack and Byzantine wormhole attack. Existing researches focusing on detecting traditional wormhole attacks can be classified into three categories: one-hop delay-based approach, topological analysis-based or special hardware/middleware-based approaches. Unfortunately, they all have their own limitations. Most of the researches detecting Byzantine wormhole attack are not addressing the Byzantine wormhole attack directly. Instead, they focus on observing the consequence after a Byzantine wormhole attack, like packet dropping or modification. In this paper, we propose to detect both traditional and Byzantine wormhole attacks by detecting some topological anomalies introduced by wormhole tunnels. Simulation results show that our scheme can achieve both high wormhole attack detection rate and accuracy. Our scheme is also simple to implement.
Related items
Showing items related by title, author, creator and subject.
-
Alam, Mohammad Rafiqul (2011)The recent advancements in the wireless technology and their wide-spread utilization have made tremendous enhancements in productivity in the corporate and industrial sectors. However, these recent progresses have also ...
-
Shafiq, M.U.; Ben Mahmud, Hisham ; Zahoor, M.K.; Shahid, A.S.A.; Rezaee, Reza ; Arif, M. (2019)Properties of rock, such as effective porosity, permeability and pore size distribution (PSD), are generally referred to as petrophysical properties. These properties are among the most significant for reservoir evaluation. ...
-
Salem, Mohammed; Armstrong, Helen (2008)During a denial of service attack, it is difficult for a firewall to differentiate legitimate packets from rogue packets, particularly in large networks carrying substantial levels of traffic. Large networks commonly use ...