DocumentCode :
1351445
Title :
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]
Author :
Ren, Yanzhi ; Chuah, Mooi Choo ; Yang, Jie ; Chen, Yingying
Volume :
17
Issue :
5
fYear :
2010
fDate :
10/1/2010 12:00:00 AM
Firstpage :
36
Lastpage :
42
Abstract :
Delay-tolerant networks are especially useful in providing mission-critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which relays them locally into the network. Wormhole attacks are a severe threat to normal network operation in DTNs. In this article we describe various methods that have been developed to detect wormhole attacks. However, most of them cannot work efficiently in DTNs. To detect the presence of a wormhole attack, we propose a detection mechanism that exploits the existence of a forbidden topology in the network. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that the proposed method can detect wormhole attacks efficiently and effectively in DTNs.
Keywords :
telecommunication network topology; telecommunication security; Zebranet mobility models; delay-tolerant networks; forbidden topology; mission-critical services; random way point mobility models; wormhole attacks detection; Ad hoc networks; Network topology; Peer to peer computing; Relays; Routing; Routing protocols; Topology;
fLanguage :
English
Journal_Title :
Wireless Communications, IEEE
Publisher :
ieee
ISSN :
1536-1284
Type :
jour
DOI :
10.1109/MWC.2010.5601956
Filename :
5601956
Link To Document :
بازگشت