Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies

被引:0
|
作者
Thaier Hayajneh
Prashant Krishnamurthy
David Tipper
Anh Le
机构
[1] Hashemite University,Department of Computer Engineering
[2] University of Pittsburgh,School of Information Sciences
来源
关键词
secure neighborhood; wormhole attacks; route hop counts; ad hoc networks;
D O I
暂无
中图分类号
学科分类号
摘要
A fundamental requirement for nodes in ad hoc and sensor networks is the ability to correctly determine their neighborhood. Many applications, protocols, and network wide functions rely on correct neighborhood discovery. Malicious nodes that taint neighborhood information using wormholes can significantly disrupt the operation of ad hoc networks. Protocols that depend only on cryptographic techniques (e.g, authentication and encryption) may not be able to detect or prevent such attacks. In this paper we propose SECUND, a protocol for creating a SECUre NeighborhooD, that makes use of discrepancies in routing hop count information to detect “true” neighbors and remove those links to nodes that appear to be neighbors, but are not really neighbors. SECUND is simple, localized and needs no special hardware, localization, or synchronization. We evaluate SECUND using simulations and demonstrate its effectiveness in the presence of multiple and multi-ended wormholes. Lastly, we present approaches to improve the efficiency of the SECUND process.
引用
收藏
页码:415 / 430
页数:15
相关论文
共 50 条
  • [41] A Secure Approach for Caching Contents in Wireless Ad Hoc Networks
    Kiskani, Mohsen Karimzadeh
    Sadjadpour, Hamid R.
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (11) : 10249 - 10258
  • [42] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks
    Boulaiche, Mehdi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 114 (01) : 483 - 517
  • [43] Survey of Secure Routing Protocols for Wireless Ad Hoc Networks
    Mehdi Boulaiche
    [J]. Wireless Personal Communications, 2020, 114 : 483 - 517
  • [44] A secure VLAN construction protocol in wireless ad hoc networks
    Wang, TI
    Yeh, CH
    Huang, YM
    [J]. ITRE 2005: 3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, PROCEEDINGS, 2005, : 68 - 72
  • [45] Secure Routing Protocol base on secure path in ad hoc wireless networks
    Al Otaibi, Saud
    Siewe, Francois
    [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 46 - 53
  • [46] Hop-Count Authentication with Moving Keys for Mobile Ad Hoc Networks
    Choi, Seonho
    [J]. 2024 SILICON VALLEY CYBERSECURITY CONFERENCE, SVCC 2024, 2024,
  • [47] Neighbor caching in multi-hop wireless ad hoc networks
    Cho, J
    Oh, S
    Kim, J
    Lee, HH
    Lee, J
    [J]. IEEE COMMUNICATIONS LETTERS, 2003, 7 (11) : 525 - 527
  • [48] Modeling Forwarding Progress for One Hop in Wireless Ad Hoc Networks
    Kuo, Jia-Chun
    Liao, Wanjiun
    [J]. 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2006, : 163 - 167
  • [49] Computing 2-hop neighborhoods in ad hoc wireless networks
    Calinescu, G
    [J]. AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2003, 2865 : 175 - 186
  • [50] An enhanced next hop selection scheme for ad hoc wireless networks
    Lee, Do-hyeon
    Jang, Beom-soo
    Jung, Jae-il
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 66 - 71