Topological Comparison Based Approach of Detecting Wormhole Attacks in OLSR Protocol

被引:0
|
作者
Alam, Mohammad [1 ]
Chan, King-Sun [1 ]
机构
[1] Curtin Univ Technol, Dept ECE, Perth, WA, Australia
关键词
wormhole attack; OLSR protocol; MANET; topological comparison; RTT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As a result, two distant nodes believe that there exists a direct communication link between them. In this paper, we focus on the wormhole attack problem in optimized link state routing (OLSR) protocol. We propose to conduct both round trip time (RTT) measurement and topological comparison to detect wormhole attack. Simulation results show that our proposed method can achieve high detection rate and accuracy of alarms.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] An Efficient Approach for Detecting Wormhole Attacks in AODV Routing Protocol
    Thakurta, Parag Kumar Guha
    Guin, Rajeswar
    Bandyopadhyay, Subhansu
    ADVANCED COMPUTATIONAL AND COMMUNICATION PARADIGMS, VOL 2, 2018, 706 : 217 - 227
  • [2] Detecting Attacks in QoS-OLSR Protocol
    Sanadiki, Hiba
    Otrok, Hadi
    Mourad, Azzam
    Robert, Jean-Marc
    2013 9TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2013, : 1126 - 1131
  • [3] Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks
    Ahutu, Ohida Rufai
    El-Ocla, Hosam
    IEEE ACCESS, 2020, 8 (08): : 63270 - 63282
  • [4] Detecting and avoiding wormhole attacks in optimized link state routing protocol
    Nait-Abdesselam, Farid
    Bensaou, Brahim
    Yoo, Jinkyu
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3119 - +
  • [5] Detecting wormhole attacks in wireless sensor networks
    Xu, Yurong
    Chen, Guanling
    Ford, James
    Makedon, Fillia
    CRITICAL INFRASTRUCTURE PROTE CTION, 2008, 253 : 267 - +
  • [6] Topological comparison-based wormhole detection for MANET
    Chan, King Sun
    Alam, Mohammad Rafiqul
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (07) : 1051 - 1068
  • [7] Modeling Message Spoofing Attacks on the OLSR Routing Protocol
    Litvinov, George
    Shcherba, Evgeny
    2019 URAL SYMPOSIUM ON BIOMEDICAL ENGINEERING, RADIOELECTRONICS AND INFORMATION TECHNOLOGY (USBEREIT), 2019, : 299 - 302
  • [8] Specification based IDS for Camouflaging Wormhole Attack in OLSR
    Dutta, Chaitali Biswas
    Biswas, Utpal
    2015 23RD MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2015, : 960 - 966
  • [9] Handling Wormhole Attacks in WSNs Using Location Based Approach
    Naidu, Swarna Mahesh
    Himaja, Vemuri Bhavani
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 43 - 51
  • [10] DETECTING WORMHOLE ATTACKS IN DELAY-TOLERANT NETWORKS
    Ren, Yanzhi
    Chuah, Mooi Choo
    Yang, Jie
    Chen, Yingying
    IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) : 36 - 42