Topological Comparison Based Approach of Detecting Wormhole Attacks in OLSR Protocol

被引:0
|
作者
Alam, Mohammad [1 ]
Chan, King-Sun [1 ]
机构
[1] Curtin Univ Technol, Dept ECE, Perth, WA, Australia
关键词
wormhole attack; OLSR protocol; MANET; topological comparison; RTT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As a result, two distant nodes believe that there exists a direct communication link between them. In this paper, we focus on the wormhole attack problem in optimized link state routing (OLSR) protocol. We propose to conduct both round trip time (RTT) measurement and topological comparison to detect wormhole attack. Simulation results show that our proposed method can achieve high detection rate and accuracy of alarms.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] SeRWA: A secure routing protocol against wormhole attacks in sensor networks
    Madria, Sanjay
    Yin, Jian
    AD HOC NETWORKS, 2009, 7 (06) : 1051 - 1063
  • [32] Detecting Bottlenecks on-the-fly in OLSR based MANETs
    Schweitzer, Nadav
    Stulman, Ariel
    Hirst, Tirza
    Margalit, Roy David
    Armon, Meir
    Shabtai, Asaf
    2014 IEEE 28TH CONVENTION OF ELECTRICAL & ELECTRONICS ENGINEERS IN ISRAEL (IEEEI), 2014,
  • [33] A cluster-based approach against wormhole attacks in MANETs among smart grid
    Liu, Weijie
    Chen, Zhiran
    Yu, Xiang
    Zhou, Xue
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [34] DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS
    Yao, Lan
    Zhao, Zhibin
    Yu, Ge
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2013, 6 (01) : 229 - 243
  • [35] A New Approach for Detecting DDoS Attacks Based on Wavelet Analysis
    Li, Muhai
    Li, Ming
    PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOLS 1-9, 2009, : 3774 - 3778
  • [36] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Xin Huang
    Fei Yan
    Liqiang Zhang
    Kai Wang
    Information Systems Frontiers, 2021, 23 : 269 - 283
  • [37] A rule-based approach for detecting heartbleed cyber attacks
    Amodei, A.
    Capriglione, D.
    Ferrigno, L.
    Miele, G.
    Tomasso, G.
    Cerro, G.
    2022 IEEE INTERNATIONAL SYMPOSIUM ON MEASUREMENTS & NETWORKING (M&N 2022), 2022,
  • [38] A Dense Neural Network Approach for Detecting Clone ID Attacks on the RPL Protocol of the IoT
    Morales-Molina, Carlos D.
    Hernandez-Suarez, Aldo
    Sanchez-Perez, Gabriel
    Toscano-Medina, Linda K.
    Perez-Meana, Hector
    Olivares-Mercado, Jesus
    Portillo-Portillo, Jose
    Sanchez, Victor
    Garcia-Villalba, Luis Javier
    SENSORS, 2021, 21 (09)
  • [39] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Huang, Xin
    Yan, Fei
    Zhang, Liqiang
    Wang, Kai
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (02) : 269 - 283
  • [40] A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems
    Monkam, Galamo F.
    De Lucia, Michael J.
    Bastian, Nathaniel D.
    COMPUTERS & SECURITY, 2024, 144