DocumentCode
3280412
Title
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Author
Wang, Xia ; Wong, Johnny
Author_Institution
Iowa State Univ., Ames
Volume
1
fYear
2007
fDate
24-27 July 2007
Firstpage
39
Lastpage
48
Abstract
Wormhole attack is a severe attack in wireless ad hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time over each link during the route establishment, which requires special hardware or causes overhead on all links even though only one link on each route could be affected by a wormhole attack. In this article, we propose an end-to-end detection of wormhole attack (EDWA) in wireless ad-hoc networks. We first present the wormhole detection which is based on the smallest hop count estimation between source and destination. If the hop count of a received shortest route is much smaller than the estimated value an alert of wormhole attack is raised at the source node. Then the source node will start a wormhole TRACING procedure to identify the two end points of the wormhole. Finally, a legitimate route is selected for data communication. Both our analysis and simulation results show that the end-to-end wormhole detection method is effective when the source and destination are not too far away.
Keywords
ad hoc networks; telecommunication network routing; telecommunication security; TRACING procedure; data communication; end-to-end detection; route establishment; wireless ad-hoc networks; wormhole attack; wormhole detection; Ad hoc networks; Analytical models; Communication system security; Computer science; Data communication; Hardware; Mobile ad hoc networks; Protocols; Relays; Spread spectrum communication;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International
Conference_Location
Beijing
ISSN
0730-3157
Print_ISBN
0-7695-2870-8
Type
conf
DOI
10.1109/COMPSAC.2007.63
Filename
4290982
Link To Document