End-to-end protocol to secure ad hoc networks against wormhole attacks

被引:4
|
作者
Khurana, Sandhya [1 ]
Gupta, Neelima [1 ]
机构
[1] Univ Delhi, Dept Comp Sci, Delhi 110007, India
关键词
ad hoc network; security; attack; wormhole; end-to-end;
D O I
10.1002/sec.272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the protocols to defend ad hoc networks against wormhole attacks rely on 'trust your neighbor' relationship. In this paper, we present an end-to-end algorithm which is more efficient than the existing algorithm both in terms of space and time. As our algorithm does not require speed and time, we do not need clock synchronization. We prove that our algorithm is able to detect wormholes with tunnel length greater than or equal to [{(2p - 1)/2p} k + 2/p]r(max), where p = r(max)/r(min), r(min) is the minimum communication range, r(max) is the maximum communication range between any two nodes, and k is path length in terms of the number of hop-counts. However, with the help of simulations we show that we are able to detect wormholes even when tunnel length is much less than [{(2p - 1)/2p} k + 2/p] r(max). We also studied the effect of error in the positions of the node on the wormhole detection capability. In the absence of any error in the location, there are no false alarms and in the presence of error the effect on detection capability is negligible. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:994 / 1002
页数:9
相关论文
共 50 条
  • [1] An end-to-end detection of wormhole attack in wireless ad-hoc networks
    Wang, Xia
    Wong, Johnny
    [J]. COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 39 - +
  • [2] End-to-end Congestion Relief Routing Protocol for Ad Hoc Networks
    Xu, Yang
    Liu, Jia
    Ando, Ruo
    Shiratori, Norio
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 87 - 92
  • [3] Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 39 : 31 - 40
  • [4] End-to-end authentication based secure communication in vehicular ad hoc networks (VANET)
    Kumar, Ankit
    Sharma, Neeraj
    Kumar, Abhishek
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (01): : 219 - 229
  • [5] An efficient transport protocol for ad hoc networks: An end-to-end freeze TCP with timestamps
    Cho, SR
    Sirisena, H
    Pawlikowski, K
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2004, 6 (04) : 376 - 386
  • [6] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503
  • [7] An end-to-end bandwidth allocation algorithm for ad hoc networks
    Cai, ZJ
    Lu, M
    Wang, XD
    [J]. TELECOMMUNICATION SYSTEMS, 2003, 22 (1-4) : 281 - 297
  • [8] Emulating end-to-end losses and delays for ad hoc networks
    Seddik-Ghaleb, Alaa
    Ghamri-Doudane, Yacine
    Senouci, Sidi-Mohammed
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3224 - +
  • [9] On increasing end-to-end throughput in wireless ad hoc networks
    Li, ZP
    Li, BC
    [J]. 2005 2nd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine), 2005, : 272 - 280
  • [10] An End-to-End Bandwidth Allocation Algorithm for Ad Hoc Networks
    Zhijun Cai
    Mi Lu
    Xiaodong Wang
    [J]. Telecommunication Systems, 2003, 22 : 281 - 297