Wormhole attacks detection and prevention based on 2-hop neighbor in Wireless Mesh Networks

被引:0
|
作者
Wen, Huaiyu [1 ]
Luo, Guangchun [1 ]
机构
[1] School of Computer Science and Engineering, University of Electronic Science and Technology, Chengdu 610054, China
来源
关键词
Accident prevention - Electric network topology - MESH networking - Random processes - Routing protocols - Wireless mesh networks (WMN) - Wireless telecommunication systems;
D O I
10.12733/jics20102219
中图分类号
学科分类号
摘要
Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can't be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a high efficiency wormhole detection algorithm based on 2-hop neighbor in WMNs, which is called Wormhole Detection based on Neighbor's Neighbor scheme (WDNN). Then a simple Random Walk Route scheme (RWR) is proposed to prevent routes from wormholes, which attract traffic of the routing protocols based on least cost. In WDNN, through enlarging the transmission range of the 2-hop neighbor, the faked network topology resulted by wormholes can be detected without using extra hardware or clock synchronization. In RWR, the route is chosen without using the low latency link which is created by wormholes. Security analysis shows that the wormhole attacks can be detected and also be prevented using our schemes efficiently. And our simulation results also indicate that our schemes can obtain a 100% wormhole detection rate and prevent routes from being attacked by the adversary against traditional routing protocols. 1548-7741/Copyright © 2013 Binary Information Press.
引用
收藏
页码:4461 / 4476
相关论文
共 50 条
  • [1] Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
    Luan, Liang-yu
    Fu, Ying-fang
    Xiao, Peng
    Peng, Ling-xi
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (05) : 878 - 886
  • [2] Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
    Liang-yu Luan
    Ying-fang Fu
    Peng Xiao
    Ling-xi Peng
    International Journal of Computational Intelligence Systems, 2012, 5 : 878 - 886
  • [3] Preventing Wormhole Attacks in Wireless Mesh Networks
    Luan, Liangyu
    Fu, Yingfang
    Xiao, Peng
    Peng, Lingxi
    COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION III, 2014, 443 : 440 - +
  • [4] RTT based wormhole detection for wireless mesh networks
    Roy A.K.
    Khan A.K.
    International Journal of Information Technology, 2020, 12 (2) : 539 - 546
  • [5] Prevention of Wormhole Attacks in Wireless Sensor Networks
    Aldhobaiban, Dema
    Elleithy, Khaled
    Almazaydeh, Laiali
    2014 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, MODELLING AND SIMULATION, 2014, : 287 - 291
  • [6] On the Connectivity of 2-Hop Neighbor Graph
    Hou, Yun
    Qin, Jiahu
    Yu, Changbin
    2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 6092 - 6097
  • [7] Detection of wormhole attacks in mobility-based wireless sensor networks
    Patel, Manish
    Aggarwal, Akshai
    Chaubey, Nirbhay K.
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2018, 21 (02) : 147 - 156
  • [8] Wormhole Detection Algorithm: To Detect Wormhole Attacks Efficiently in Wireless Networks
    Regan, R.
    Dhivyadarsani, E.
    Nandhini, B.
    Priya, A.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 121 - 128
  • [9] Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks
    Karri, Ganesh Reddy
    Thilagam, P. Santhi
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2442 - 2462
  • [10] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    AD HOC NETWORKS, 2010, 28 : 208 - +