Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network

被引:3
|
作者
Liu, Jun [1 ]
Chen, Huiting [1 ]
Zhen, Zhong [2 ]
Sha, Mingbo [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Equipment Acad Air Force, Commun Inst, Beijing, Peoples R China
[3] ALLWIN Telecommun Co Ltd, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Wormhole; Attack detection; The shortest path; Path tracking;
D O I
10.1007/978-81-322-1759-6_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes on the edge of the network to find all disjoint paths between them, then to identify a suspicious path that has the smallest hops according to the characteristic of wormhole attack. The detecting node sends a tracing packet to intermediate nodes through the suspicious path, to find and isolate infected nodes. Simulation results show that this detection algorithm resists the wormhole attack effectively and ensures the network security.
引用
收藏
页码:147 / 154
页数:8
相关论文
共 50 条
  • [21] Using attack graphs in ad hoc networks - For intrusion predictor correlation and detection
    Azer, Marianne
    El-Kassas, Sherif
    EI-Soudani, Magdy
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 63 - +
  • [22] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [23] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [24] A Novel Intrusion Detection System for Ad Hoc Flooding Attack Using Fuzzy Logic in Mobile Ad Hoc Networks
    Chaudhary, Alka
    Tiwari, Vivekananda
    Kumar, Anil
    [J]. 2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [25] Sybil Attack Prevention and Detection in Vehicular Ad hoc Network
    Sharma, Aravendra Kumar
    Saroj, Sushil Kumar
    Chauhan, Sanjeev Kumar
    Saini, Sachin Kumar
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 594 - 599
  • [26] Intrusion detection in mobile ad-hoc network using Hybrid Reactive Search and Bat algorithm
    Srilakshmi, R.
    Muthukuru, Jayabhaskar
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT UNMANNED SYSTEMS, 2022, 10 (01) : 65 - 85
  • [27] Research on Intrusion Detection Technique of Mobile Ad Hoc Network Security
    Sun, Huafeng
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2483 - 2488
  • [28] On the anomaly intrusion-detection in mobile ad hoc network environments
    Puttini, Ricardo
    Hanashiro, Maira
    Miziara, Fabio
    de Sousa, Rafael
    Garcia-Villalba, L. Javier
    Barenco, C. J.
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2006, 4217 : 182 - 193
  • [29] Three Phase Technique for Intrusion Detection in Mobile Ad Hoc Network
    Arya, K. V.
    Vashistha, Prerna
    Gupta, Vaibhav
    [J]. DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND ITS APPLICATIONS, PT I, 2011, 166 : 675 - 684
  • [30] The Intrusion Detection Model Based on the Fuzzy Judgment in Ad Hoc Network
    Liu Shi-rui
    Li Zhe
    [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2886 - 2889