Proceedings ArticleDOI
Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis
Zhibin Zhao,Bo Wei,Xiaomei Dong,Lan Yao,Fuxiang Gao +4 more
- Vol. 1, pp 251-254
TLDR
This paper presents the SA-TC algorithm, based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links and shows that it can detect and locate wormhole attacks successfully and efficiently.Abstract:
With the properties of openness and dynamic in topology, wireless sensor networks are challenged with great security threats. In this paper we focus on the wormhole attack which is proved to be particularly dangerous to the resource-limited sensor nodes. We present the SA-TC algorithm for detecting and thus defending against this serious threat. It is based on the on-demand multi-path routings and uses statistical analysis and time constraint to identify the suspected links. It needs neither time synchronization among the sensors nor extra hardwares such as directional antenna and GPS. The simulative experiment shows that SA-TC can detect and locate wormhole attacks successfully and efficiently.read more
Citations
More filters
Journal ArticleDOI
Data Collection for Security Measurement in Wireless Sensor Networks: A Survey
TL;DR: An overview of WSNs is provided and classify the attacks in W SNs based on protocol stack layers and attack detection methods of eleven mainstream attacks are researched for WSN security measurement.
Proceedings ArticleDOI
Security attacks in wireless sensor networks: A survey
Manish Patel,Akshai Aggarwal +1 more
TL;DR: This paper discussed about all the attacks on wireless sensor networks, some of the mitigation schemes to defend these attacks, and how to defend against these attacks.
Proceedings ArticleDOI
Wormhole attacks in wireless adhoc networks and their counter measurements: A survey
Preeti Nagrath,Bhawna Gupta +1 more
TL;DR: The modes of wormholes, how wormholes disrupts routing in AODV, DSR, OLSR and then the solutions and countermeasures on wormholes are discussed.
Dissertation
Energy-efficient routing and secure communication in wireless sensor networks
TL;DR: In this paper, the authors present a list of publications with the same title.xviii List of Publications xx list of authors xx list list of titles xx.xvi List of publications
Proceedings ArticleDOI
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks
TL;DR: A set of algorithms are proposed to aggregate the collected evidences, identify colluding nodes, and reconstruct the potential scenarios of wormholes attacks in WSN.
References
More filters
Dynamic Source Routing in Ad Hoc Wireless Networks.
David B. Johnson,David A. Maltz +1 more
TL;DR: In this article, the authors present a protocol for routing in ad hoc networks that uses dynamic source routing, which adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Book ChapterDOI
Dynamic Source Routing in Ad Hoc Wireless Networks
David B. Johnson,David A. Maltz +1 more
TL;DR: This paper presents a protocol for routing in ad hoc networks that uses dynamic source routing that adapts quickly to routing changes when host movement is frequent, yet requires little or no overhead during periods in which hosts move less frequently.
Proceedings ArticleDOI
Packet leashes: a defense against wormhole attacks in wireless networks
TL;DR: A new, general mechanism, called packet leashes, is presented for detecting and thus defending against wormhole attacks, and a specific protocol is presented, called TIK, that implements leashes.
Proceedings ArticleDOI
Split multipath routing with maximally disjoint paths in ad hoc networks
Sung-Ju Lee,Mario Gerla +1 more
TL;DR: This work proposes an on-demand routing scheme called split multipath routing (SMR) that establishes and utilizes multiple routes of maximally disjoint paths and uses a per-packet allocation scheme to distribute data packets into multiple paths of active sessions.
Proceedings Article
Using Directional Antennas to Prevent Wormhole Attacks.
Lingxuan Hu,David Evans +1 more
TL;DR: A cooperative protocol whereby nodes share directional information to prevent wormhole endpoints from masquerading as false neighbors is presented, which greatly diminishes the threat of wormhole attacks and requires no location information or clock synchronization.