Topological Comparison Based Approach of Detecting Wormhole Attacks in OLSR Protocol

被引:0
|
作者
Alam, Mohammad [1 ]
Chan, King-Sun [1 ]
机构
[1] Curtin Univ Technol, Dept ECE, Perth, WA, Australia
关键词
wormhole attack; OLSR protocol; MANET; topological comparison; RTT;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
MANETs are vulnerable to a number of security threats due to their flexible characteristics such as dynamic topology formation, openness of the wireless medium and resource constraints. Wormhole attack is one of the most sophisticated forms of security threats in MANET wherein two or more colluders silently record packets at one location and then tunnel them to another location in the network. As a result, two distant nodes believe that there exists a direct communication link between them. In this paper, we focus on the wormhole attack problem in optimized link state routing (OLSR) protocol. We propose to conduct both round trip time (RTT) measurement and topological comparison to detect wormhole attack. Simulation results show that our proposed method can achieve high detection rate and accuracy of alarms.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Performance Analysis of OLSR Protocol for Wireless Sensor Networks and Comparison Evaluation with AODV Protocol
    Yang, Tao
    Barolli, Leonard
    Ikeda, Makoto
    Xhafa, Fatos
    Durresi, Arjan
    2009 INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS, 2009, : 335 - +
  • [42] The fuzzy based QMPR selection for OLSR routing protocol
    Kots, Ashish
    Kumar, Manoj
    WIRELESS NETWORKS, 2014, 20 (01) : 1 - 10
  • [43] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [44] Defense Technology of Wormhole Attacks Based on Node Connectivity
    Zheng, Jiu-hu
    Qian, Huan-yan
    Wang, Lie
    2015 IEEE INTERNATIONAL CONFERENCE ON SMART CITY/SOCIALCOM/SUSTAINCOM (SMARTCITY), 2015, : 421 - 425
  • [45] DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad hoc Networks
    Hayajneh, Thaier
    Krishnamurthy, Prashant
    Tipper, David
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 73 - 80
  • [46] Efficient Clustering based OLSR Routing Protocol for VANET
    Mehra, Ruchi
    Bali, Rasmeet S.
    Kaur, Prabhsharan
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,
  • [47] The fuzzy based QMPR selection for OLSR routing protocol
    Ashish Kots
    Manoj Kumar
    Wireless Networks, 2014, 20 : 1 - 10
  • [48] An unsupervised approach for detecting DDoS attacks based on traffic-based metrics
    Lu, W
    Traore, I
    2005 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2005, : 462 - 465
  • [49] An Approach for Preventing and Detecting Attacks in the Cloud
    Merino, Louis-Henri
    Cukier, Michel
    2020 IEEE/ACM 13TH INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING (UCC 2020), 2020, : 165 - 175
  • [50] A Novel Method for Detecting Attacks Towards the SIP Protocol
    Callegari, Christian
    Garroppo, Rosario G.
    Giordano, Stefano
    Pagano, Michele
    Russo, Franco
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 268 - 273