Intrusion Detection Algorithm for the Wormhole Attack in Ad Hoc Network

被引:3
|
作者
Liu, Jun [1 ]
Chen, Huiting [1 ]
Zhen, Zhong [2 ]
Sha, Mingbo [3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang, Peoples R China
[2] Equipment Acad Air Force, Commun Inst, Beijing, Peoples R China
[3] ALLWIN Telecommun Co Ltd, Shenyang, Peoples R China
基金
中国国家自然科学基金;
关键词
Wormhole; Attack detection; The shortest path; Path tracking;
D O I
10.1007/978-81-322-1759-6_18
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The wormhole attack is a kind of attack that is focusing on routing protocols and having big destructiveness. We propose a path-tracking method based on detecting nodes. It deploys a number of detecting nodes on the edge of the network to find all disjoint paths between them, then to identify a suspicious path that has the smallest hops according to the characteristic of wormhole attack. The detecting node sends a tracing packet to intermediate nodes through the suspicious path, to find and isolate infected nodes. Simulation results show that this detection algorithm resists the wormhole attack effectively and ensures the network security.
引用
收藏
页码:147 / 154
页数:8
相关论文
共 50 条
  • [31] A Review on Intrusion Detection System in Mobile Ad-Hoc Network
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    [J]. 2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 549 - 554
  • [32] A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network
    Shrestha, Rakesh
    Sung, Jong-Yeop
    Lee, Sang-Duck
    Sik-Yun, Pyung
    Choi, Dong-You
    Han, Seung-Jo
    [J]. PROCEEDINGS OF THE 2009 PACIFIC-ASIA CONFERENCE ON CIRCUITS, COMMUNICATIONS AND SYSTEM, 2009, : 759 - 762
  • [33] Intrusion Detection Scheme in Vehicular Ad-Hoc Complex Network
    Zhang, Hong
    [J]. CICTP 2020: TRANSPORTATION EVOLUTION IMPACTING FUTURE MOBILITY, 2020, : 5250 - 5257
  • [34] Reactive Protocols Analysis with Wormhole Attack in Ad-hoc Networks
    Garg, Gaurav
    Kaushal, Sakshi
    Sharma, Akashdeep
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT, 2014,
  • [35] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [36] Design of Intrusion Detection System for Wormhole Attack Detection in Internet of Things
    Deshmukh-Bhosale, Snehal
    Sonavane, S. S.
    [J]. ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, 2020, 1082 : 513 - 523
  • [37] Studies on TBRPF Routing Algorithm and Detection of Routing Loop Attack in Mobile Ad-Hoc Network
    Ghosh, Deboleena
    [J]. ADVANCES IN COMPUTER SCIENCE AND EDUCATION APPLICATIONS, PT II, 2011, 202 : 60 - 66
  • [38] Detection of Phishing Attack Using Visual Cryptography in Ad hoc Network
    Kumar, Vimal
    Kumar, Rakesh
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND SIGNAL PROCESSING (ICCSP), 2015, : 1021 - 1025
  • [39] Wormhole Attack Detection Based on Distance Verification and the Use of Hypothesis Testing for Wireless Ad Hoc Networks
    Zhou, Yifeng
    Lamont, Louise
    Li, Li
    [J]. MILCOM 2009 - 2009 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-4, 2009, : 63 - 69
  • [40] An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network
    Kumar, Vimal
    Kumar, Rakesh
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 472 - 479