Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network

被引:3
|
作者
Liu, Jun [1 ]
Chen, Huiting [1 ]
Zhen, Zhong [2 ]
Sha, Mingbo [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Equipment Acad Air Force, Commun Inst, Beijing, Peoples R China
[3] ALLWIN Telecommun Co Ltd, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Wormhole; Attack detection; The shortest path; Path tracking;
D O I
10.1007/978-81-322-1759-6_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes on the edge of the network to find all disjoint paths between them, then to identify a suspicious path that has the smallest hops according to the characteristic of wormhole attack. The detecting node sends a tracing packet to intermediate nodes through the suspicious path, to find and isolate infected nodes. Simulation results show that this detection algorithm resists the wormhole attack effectively and ensures the network security.
引用
收藏
页码:147 / 154
页数:8
相关论文
共 50 条
  • [1] Wormhole attack detection in ad hoc network using machine learning technique
    Prasad, Mahendra
    Tripathi, Sachin
    Dahal, Keshav
    [J]. 2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [2] Study of Various Wormhole Attack Detection Techniques in Mobile Ad hoc Network
    Mudgal, Richa
    Gupta, Rohit
    [J]. 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 3748 - 3754
  • [3] Wormhole attack detection techniques in ad-hoc network: A systematic review
    Gupta, Chitvan
    Singh, Laxman
    Tiwari, Rajdev
    [J]. OPEN COMPUTER SCIENCE, 2022, 12 (01): : 260 - 288
  • [4] A Hybrid Wormhole Attack Detection in Mobile Ad-Hoc Network (MANET)
    Tahboush, Muhannad
    Agoyi, Mary
    [J]. IEEE ACCESS, 2021, 9 : 11872 - 11883
  • [5] Wormhole Attack in Mobile Ad-hoc Network: A Survey
    Shrivastava, Akansha
    Dubey, Rajni
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 293 - 298
  • [6] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Parvinder Kaur
    Dalveer Kaur
    Rajiv Mahajan
    [J]. Wireless Personal Communications, 2017, 97 : 2939 - 2950
  • [7] Wormhole Attack Detection Technique in Mobile Ad Hoc Networks
    Kaur, Parvinder
    Kaur, Dalveer
    Mahajan, Rajiv
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (02) : 2939 - 2950
  • [8] Machine Learning Methods for Intrusive Detection of Wormhole Attack in Mobile Ad Hoc Network (MANET)
    Abdan, Masoud
    Seno, Seyed Amin Hosseini
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [9] Recovery from Wormhole Attack in Mobile Ad Hoc Network (MANET)
    季晓君
    田畅
    张毓森
    [J]. Journal of Shanghai Jiaotong University(Science), 2006, (02) : 188 - 191
  • [10] An intrusion detection model for ad hoc network
    School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
    [J]. Dongbei Daxue Xuebao, 2006, 7 (739-742):