DocumentCode :
2937020
Title :
Interactive Wormhole Detection in Large Scale Wireless Networks
Author :
Wang, Weichao ; Lu, Aidong
Author_Institution :
Kansas Univ.
fYear :
2006
fDate :
Oct. 31 2006-Nov. 2 2006
Firstpage :
99
Lastpage :
106
Abstract :
Wormhole attacks in wireless networks can severely deteriorate the network performance and compromise the security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple worm-hole attackers. Various visual forms have been adopted to assist the understanding and analysis of the reconstructed network topology and improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. The proposed approach demonstrates that interactive visualization can be successfully combined with network security mechanisms to greatly improve the intrusion detection capabilities
Keywords :
data visualisation; radio networks; security of data; telecommunication security; automatic detection algorithm; interactive visualization of wormholes; interactive wormhole detection; intrusion detection; large scale wireless network; network topology visualization; routing protocol; user interaction; Communication system security; Detection algorithms; Hardware; Information security; Large-scale systems; Monitoring; Network topology; Routing protocols; Visualization; Wireless networks; C.2.0 [Computer-Communication Networks]: General¿Security and protection; H.5.2 [Information Systems]: Information Interfaces and Presentation¿User interfaces; Interactive Detection; Topology Visualization; Visualization on Network Security; Wireless Networks; Wormhole Attacks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Visual Analytics Science And Technology, 2006 IEEE Symposium On
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0591-2
Electronic_ISBN :
1-4244-0592-0
Type :
conf
DOI :
10.1109/VAST.2006.261435
Filename :
4035753
Link To Document :
بازگشت