Topological comparison-based wormhole detection for MANET
dc.contributor.author | Chan, King-Sun | |
dc.contributor.author | Alam, Mohammad | |
dc.date.accessioned | 2017-01-30T11:50:17Z | |
dc.date.available | 2017-01-30T11:50:17Z | |
dc.date.created | 2015-04-28T20:00:43Z | |
dc.date.issued | 2014 | |
dc.identifier.citation | Chan, K. and Alam, M. 2014. Topological comparison-based wormhole detection for MANET. International Journal of Communication Systems. 27 (7): pp. 1051-1068. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/15532 | |
dc.description.abstract |
Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormhole attack can be further divided into two categories: traditional wormhole attack and Byzantine wormhole attack. Existing researches focusing on detecting traditional wormhole attacks can be classified into three categories: one-hop delay-based approach, topological analysis-based or special hardware/middleware-based approaches. Unfortunately, they all have their own limitations. Most of the researches detecting Byzantine wormhole attack are not addressing the Byzantine wormhole attack directly. Instead, they focus on observing the consequence after a Byzantine wormhole attack, like packet dropping or modification. In this paper, we propose to detect both traditional and Byzantine wormhole attacks by detecting some topological anomalies introduced by wormhole tunnels. Simulation results show that our scheme can achieve both high wormhole attack detection rate and accuracy. Our scheme is also simple to implement. | |
dc.publisher | John Wiley & Sons | |
dc.relation.uri | http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf | |
dc.subject | MANET | |
dc.subject | topological comparison | |
dc.subject | Byzantine wormhole attack | |
dc.subject | RTT | |
dc.subject | wormhole attack | |
dc.title | Topological comparison-based wormhole detection for MANET | |
dc.type | Journal Article | |
dcterms.source.volume | 27 | |
dcterms.source.number | 7 | |
dcterms.source.startPage | 1051 | |
dcterms.source.endPage | 1068 | |
dcterms.source.issn | 1074-5351 | |
dcterms.source.title | International Journal of Communication Systems | |
curtin.department | Department of Electrical and Computer Engineering | |
curtin.accessStatus | Fulltext not available |