Preventing Wormhole Attacks in Wireless Mesh Networks

Article Preview

Abstract:

In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

440-445

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] I.F. Akyildiz, X. Wang.: A survey on wireless mesh networks. J. IEEE Radio Communications, 43(9), 23-30 (2005).

Google Scholar

[2] X. Wang, S. Choi, J.P. Hubaux.: Wireless mesh networking: theories, protocols, and systems. IEEE Wireless Communications, 13(2), 8-9 (2006).

DOI: 10.1109/mwc.2006.1632475

Google Scholar

[3] Khalil, S. Bagchi, N.B. Shroff.: MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks. Ad Hoc Networks, 6, 344-362(2008).

DOI: 10.1016/j.adhoc.2007.02.001

Google Scholar

[4] P. Nagrath, B. Gupta. : Wormhole Attacks in Wireless Ad hoc Networks and their Counter Measurements: A Survey. In: 3rd International Conference on Electronics Computer Technology, pp.245-250. IEEE Press, New York(2011).

DOI: 10.1109/icectech.2011.5942091

Google Scholar

[5] K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, etc.: A secure routing protocol for ad hoc networks. In: 10th IEEE International Conference on Network Protocols, pp.78-87. IEEE Press, New York(2002).

DOI: 10.1109/icnp.2002.1181388

Google Scholar

[6] Using directional antennas to prevent wormhole attacks, http: /www. isoc. org/isoc/conferences/ndss/04/proceedings/Papers/Hu. pdf.

Google Scholar

[7] Y.C. Hu, A. Perrig, D.B. Johnson.: Packet leashes: a defense against wormhole attacks in wireless networks. In: 22nd INFOCOM, pp.1976-1986. IEEE Press, New York (2003).

DOI: 10.1109/infcom.2003.1209219

Google Scholar

[8] Rushing attacks and defense in wireless ad hoc network routing protocols, http: /www. eecs. umich. edu/~zmao/eecs589/papers/Hu03. pdf.

Google Scholar

[9] H. S. Chiu, K. S. Lui.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 2nd Wireless Pervasive Computing, pp.1-6. IEEE Press, New York (2006).

DOI: 10.1109/iswpc.2006.1613586

Google Scholar

[10] X. Wang, J. Wong.: An end-to-end detection of wormhole attack in wireless ad hoc networks. In: 31st Annual international Computer Software and Applications Conference, pp.34-41. IEEE Press, New York, (2007).

DOI: 10.1109/compsac.2007.63

Google Scholar

[11] L. Lazos, R. Poovendran, C. Meadows, et al.: Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In: IEEE Wireless Communications and Networking Conference, PP. 1193-1199. IEEE Press, New York, (2005).

DOI: 10.1109/wcnc.2005.1424678

Google Scholar

[12] M. Khabbazian, H. Mercier, and V.K. Bhargava.: Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks. IEEE Transactions on Wireless Communications. 8(2), 736-745(2009).

DOI: 10.1109/twc.2009.070536

Google Scholar

[13] D. ezun Dong, M. IEEE, M. Li, et al.: Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks. IEEE Transactions on Networking. 19(6), 1-9(2011).

DOI: 10.1109/tnet.2011.2163730

Google Scholar

[14] S. Gupta, S. Kar and S Dharmaraja.: WHOP: Wormhole Attack Detection Protocol using Hound Packet. In: 7th International Conference on Innovations in Information Technology, pp.226-231. IEEE Press, New York(2011).

DOI: 10.1109/innovations.2011.5893822

Google Scholar

[15] C.E. Perkins, E.M. Royer.: Ad hoc on-demand distance vector routing. In: 2nd IEEE Workshop on Mobile Computing Systems and Applications, pp.90-100. IEEE Press, New York(1990).

DOI: 10.1109/mcsa.1999.749281

Google Scholar

[16] R. Draves, J. Padhye, B. Zill.: Routing in multi-radio, multi-hop wireless mesh networks. In: 10th ACM Annual International Conference on Mobile Computing and Networking, pp.114-128. ACM, New York(2004).

DOI: 10.1145/1023720.1023732

Google Scholar