scispace - formally typeset
Proceedings ArticleDOI

Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path

Lijun Qian, +2 more
- Vol. 4, pp 2106-2111
TLDR
Simulation results demonstrate that SAM successfully detects wormhole attacks and locates the malicious nodes in networks with cluster and uniform topologies and with different node transmission range.
Abstract
The application of multi-path techniques in wireless ad hoc networks is advantageous because multi-path routing provides means to combat the effect of unreliable wireless links and constantly changing network topology. The performance of multi-path routing under wormhole attack is studied in both cluster and uniform network topologies. Because multi-path routing is vulnerable to wormhole attacks, a scheme called statistical analysis of multi-path (SAM) is proposed to detect such attacks and to identify malicious nodes. As the name suggests, SAM detects wormhole attacks and identifies attackers by statistically analyzing the information collected by multi-path routing. Neither additional security services or systems nor security enhancement of routing protocols is needed in the proposed scheme. Simulation results demonstrate that SAM successfully detects wormhole attacks and locates the malicious nodes in networks with cluster and uniform topologies and with different node transmission range.

read more

Citations
More filters

A survey of routing attacks in mobile ad hoc networks s ecurity i n w ireless m obile a d h oc a nd s ensor n etworks

TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Journal ArticleDOI

A survey of routing attacks in mobile ad hoc networks

TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Proceedings ArticleDOI

DoS Attacks in Mobile Ad Hoc Networks: A Survey

TL;DR: A survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs are presented.
Journal ArticleDOI

Detecting and avoiding wormhole attacks in wireless ad hoc networks

TL;DR: An efficient method to detect and avoid wormhole attacks in the OLSR protocOLSR protocolol, which exhibits several advantages, among which are its nonreliance on any time synchronization or location information, and its high detection rate under various scenarios.
Proceedings ArticleDOI

An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks

TL;DR: This article proposes an end-to-end detection of wormhole attack (EDWA) in wireless ad-hoc networks and presents the wormhole detection which is based on the smallest hop count estimation between source and destination.
References
More filters

Ad hoc On-Demand Distance Vector (AODV) Routing

TL;DR: A logging instrument contains a pulsed neutron source and a pair of radiation detectors spaced along the length of the instrument to provide an indication of formation porosity which is substantially independent of the formation salinity.
Proceedings ArticleDOI

Packet leashes: a defense against wormhole attacks in wireless networks

TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Proceedings ArticleDOI

Split multipath routing with maximally disjoint paths in ad hoc networks

TL;DR: This work proposes an on-demand routing scheme called split multipath routing (SMR) that establishes and utilizes multiple routes of maximally disjoint paths and uses a per-packet allocation scheme to distribute data packets into multiple paths of active sessions.
Related Papers (5)