Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach

被引:0
|
作者
Lazos, L [1 ]
Poovendran, R [1 ]
Meadows, C [1 ]
Syverson, P [1 ]
Chang, LW [1 ]
机构
[1] Univ Washington, Seattle, WA 98195 USA
来源
2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF. | 2005年
关键词
wormhole; security; vulnerability; ad hoc networks; geometric random graph;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of network protocols without compromising any cryptographic quantity or network node. Making use of geometric random induced by the communication range constraint of the nodes, present the necessary and sufficient conditions for detecting defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We our work is the first one to present analytical calculation of probabilities of detection. We also present simulation results illustrate our theory.
引用
收藏
页码:1193 / 1199
页数:7
相关论文
共 50 条
  • [1] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [2] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Radha Poovendran
    Loukas Lazos
    Wireless Networks, 2007, 13 : 27 - 59
  • [3] A Novel Scheme for Preventing Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Song, JooSeok
    Liu, Weijie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 15 - 20
  • [4] Detecting and avoiding wormhole attacks in wireless ad hoc networks
    Nait-Abdesselam, Farid
    Bensaou, Brahim
    Taleb, Tarik
    IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 127 - 133
  • [5] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [6] DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad hoc Networks
    Hayajneh, Thaier
    Krishnamurthy, Prashant
    Tipper, David
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 73 - 80
  • [7] Preventing Wormhole Attacks in Wireless Mesh Networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    Peng, Lingxi
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 440 - +
  • [8] Time-based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Jin, Dongxu
    Liu, Weijie
    Song, JooSeok
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 1721 - 1726
  • [9] WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
    Vu, Hai
    Kulkarni, Ajay
    Sarac, Kamil
    Mittal, Neeraj
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 491 - 502
  • [10] TTM: An efficient mechanism to detect wormhole attacks in Wireless Ad-Hoc Networks
    Van Tran, Phuong
    Hung, Le Xuan
    Lee, Young-Koo
    Lee, Sungyung
    Lee, Heejo
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 593 - +