DocumentCode
3541539
Title
Modeling the Wormhole Attack in Underwater Sensor Network
Author
Xiao Lu ; Zhu Yonghua
Author_Institution
Sch. of Comput. Engeering & Sci., Shanghai Univ., Shanghai, China
fYear
2012
fDate
21-23 Sept. 2012
Firstpage
1
Lastpage
4
Abstract
In underwater sensor network, security becomes a primary concern in order to provide protected communication. In this paper, we present a novel network simulation component, wormhole attack, in NS2, for underwater sensor networks, after analyzing the current methods of simulating wormhole attack. The core idea of wormhole implementation is making a "tunnel" between two malicious nodes. If this "tunnel" is built on normal wireless or wired channel, there would be some unexpected channel loss. So in order to solve the problem, we selected the existing wired object Link, in the NS2 wired simulation package, to simulate the "tunnel" by copying the local packets and directly sending them to the wormhole object installed in a remote node. Experimental results demonstrate the effectiveness of the wormhole components in NS2 worked smoothly and comply with the actual.
Keywords
computer network security; distributed sensors; underwater acoustic communication; NS2 wired simulation package; local packets; malicious nodes; network simulation component; protected communication; remote node; tunnel; underwater sensor network security; wired object Link; wormhole attack; wormhole components; wormhole object; Ad hoc networks; Communication system security; Peer-to-peer computing; Routing protocols; Security; Wireless communication; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location
Shanghai
ISSN
2161-9646
Print_ISBN
978-1-61284-684-2
Type
conf
DOI
10.1109/WiCOM.2012.6478576
Filename
6478576
Link To Document