A Wireless Wormhole Detection Model Based on Packet Leashes

Article Preview

Abstract:

With the widely range of applications of wireless ad hoc networks, security threats are increasingly prominent, especially wormhole attacks. In a wormhole attack, unauthenticated entities secretly built wormhole tunnels, silently received messages and selectively reply. In this paper, we introduce an approach to detect and defense against wormhole attacks based on packet leashes scheme. Our solution effectively integrated shared symmetric key authentication and TIK protocol to reduce transmission delay and energy consumption. The result shows that the model can save power and reduce communication delay without sacrificing the accuracy of detection.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

212-216

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yih-Chun Hu, Adrian Perrig, and David. B. Johnson, in: Packet Leashes : a defense againse wormhole attacks in wireless networks, ". In Proceeding of Twenty-second Annual Joint Conference of the IEEE Computer and Communications(INFOCOM 2003), vol. 3, p.1976–1986, April (2003).

DOI: 10.1109/infcom.2003.1209219

Google Scholar

[2] Lingxuan Hu, David Evans, in: Using directional antennas to prevent worehole attacks. In Network and Distributed System Security Symposium, J. New York. USA, vol. 8, p.41–77, Feb (2005).

Google Scholar

[3] Issa Khalil, Saurabh Bagchi, and Ness B. Shroff, in: LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In Proceeding of the 2005 International Conference on Dependable Systems and Networks(DSN'05), Lafayette. USA, p.612–621, July (2005).

DOI: 10.1109/dsn.2005.58

Google Scholar

[4] David.B. Johnson, David A. Maltz, and Josh Broch, in: The DynamicSource Routing Protocol for Multihop Wireless Ad Hoc Networks. InAd Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139–172. Addison-Wesley, (2001).

Google Scholar

[5] Norman Abramson, in: The ALOHA System--Another Alternative for Computer Communi-cations. In Proceedings of the Fall 1970 AFIPSComputer Conference, pages 281–285, November (1970).

DOI: 10.1145/1478462.1478502

Google Scholar

[6] Bhargav Bellur and Richard G. Ogier, in: A Reliable, Efficient Topology Broadcast Protocol for Dynamic Networks. In Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'99), pages 178–186, March (1999).

DOI: 10.1109/infcom.1999.749266

Google Scholar

[7] Helion Technology Ltd, in: High Performance Solutions in Silicon-MD5 Core. Cambridge, England. Information on http: /www. heliontech. com/core5. htm.

Google Scholar

[8] Jiejun Konh, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang, in: Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), pages 251–260, November (2001).

DOI: 10.1109/icnp.2001.992905

Google Scholar

[9] Frank Stajano and Ross Anderson, in: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany, (1999).

DOI: 10.1007/10720107_24

Google Scholar

[10] Xia Wang, Johnny Wong, in: An End-to-end Detection of Wormhole Attack in Wireless ad-hoc Networks. In 31st Annual International Computer Software and Applications Conference(C0MPSAC 2007), pages 39–48, July (2007).

DOI: 10.1109/compsac.2007.63

Google Scholar

[11] Charles E. Perkins and Elizabeth M. Royer, in: Ad-Hoc On-Demand Distance Vector Routing. In Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'99), pages 90–100, February (1999).

DOI: 10.1109/mcsa.1999.749281

Google Scholar

[12] Amir Qayyum, Laurent Viennot, and Anis Laouiti, in: Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, Project HIPERCOM, INRIA, February (2000).

DOI: 10.1109/hicss.2002.994521

Google Scholar