Defending against wormhole attacks in mobile ad hoc networks

被引:51
|
作者
Wang, Weichao [1 ]
Bhargava, Bharat [1 ]
Lu, Yi [1 ]
Wu, Xiaoxin [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
来源
关键词
ad hoc network; wormhole attacks; end-to-end mechanism; overhead control;
D O I
10.1002/wcm.292
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ad hoc networks, malicious nodes can deploy wormhole attacks to fabricate a false scenario on the proximity relationship among mobile nodes. A classification of the attacks according to the format of the wormholes is proposed. This forms a basis to identify the detection capability of various approaches. An analysis shows that earlier approaches focus on the prevention of wormholes among neighbors that trust each other. As a more generic approach, we present an end-to-end scheme that can detect wormholes on a multi-hop route. Only the trust between the source and the destination is assumed. The mechanism uses geographic information to detect anomalies in neighbor relations and node movements. To reduce the computation and storage overhead, we present a scheme called cell-based open tunnel avoidance (COTA) to manage the information. COTA requires a constant space for every node on the path and the computation overhead increases linearly to the number of detection packets. We prove that the savings do not deteriorate the detection capability. Various schemes to control communication overhead are studied. The simulation and experiments on real devices show that the proposed mechanism can be combined with existent routing protocols to defend against wormhole attacks. Copyright (C) 2006 John Wiley & Sons, Ltd.
引用
收藏
页码:483 / 503
页数:21
相关论文
共 50 条
  • [1] WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
    Vu, Hai
    Kulkarni, Ajay
    Sarac, Kamil
    Mittal, Neeraj
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 491 - 502
  • [2] On mitigating in-band wormhole attacks in mobile ad hoc networks
    Su, Xu
    Boppana, Rajendra V.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1136 - 1141
  • [3] Stimulating cooperation and defending against attacks in self-organized mobile ad hoc networks
    Yu, W
    Liu, KJR
    [J]. 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005, : 65 - 75
  • [4] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Mohammadi, Payam
    Ghaffari, Ali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 106 (02) : 365 - 376
  • [5] Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis
    Payam Mohammadi
    Ali Ghaffari
    [J]. Wireless Personal Communications, 2019, 106 : 365 - 376
  • [6] Securing DSR against wormhole attacks in multirate ad hoc networks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 582 - 592
  • [7] Defending against cache consistency attacks in wireless ad hoc networks
    Zhang, Wensheng
    Cao, Guohong
    [J]. AD HOC NETWORKS, 2008, 6 (03) : 363 - 379
  • [8] Defending against packet injection attacks in unreliable ad hoc networks
    Gu, QJ
    Liu, P
    Zhu, SC
    Chu, CH
    [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1837 - 1841
  • [9] Mitigating Wormhole Attacks using Passive Monitoring in Mobile Ad Hoc Networks
    Su, Xu
    Boppana, Rajendra V.
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [10] Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes
    Su, Ming-Yang
    Chiang, Kun-Lin
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 253 - 260