We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Defending against wormhole attacks in mobile ad hoc networks.
- Authors
Weichao Wang; Bhargava, Bharat; Yi Lu; Xiaoxin Wu
- Abstract
In ad hoc networks, malicious nodes can deploy wormhole attacks to fabricate a false scenario on the proximity relationship among mobile nodes. A classification of the attacks according to the format of the wormholes is proposed. This forms a basis to identify the detection capability of various approaches. An analysis shows that earlier approaches focus on the prevention of wormholes among neighbors that trust each other. As a more generic approach, we present an end-to-end scheme that can detect wormholes on a multi-hop route. Only the trust between the source and the destination is assumed. The mechanism uses geographic information to detect anomalies in neighbor relations and node movements. To reduce the computation and storage overhead, we present a scheme called cell-based open tunnel avoidance (COTA) to manage the information. COTA requires a constant space for every node on the path and the computation overhead increases linearly to the number of detection packets. We prove that the savings do not deteriorate the detection capability. Various schemes to control communication overhead are studied. The simulation and experiments on real devices show that the proposed mechanism can be combined with existent routing protocols to defend against wormhole attacks. Copyright © 2006 John Wiley & Sons, Ltd.
- Subjects
MOBILE communication systems; MOBILE computing; COMPUTER viruses; NETWORK routers; DATA protection; TELECOMMUNICATION systems; COMPUTER networks
- Publication
Wireless Communications & Mobile Computing, 2006, Vol 6, Issue 4, p483
- ISSN
1530-8669
- Publication type
Article
- DOI
10.1002/wcm.292