Have a personal or library account? Click to login

Detecting Wormhole Attacks In Wireless Sensor Networks Using Hop Count Analysis

By:
Lan Yao,  Zhibin Zhao and  Ge Yu  
Open Access
|Feb 2013

References

  1. J. Agre, L. Clare, “An integrated architecture for cooperative sensing networks”, IEEE Computer, Vol 33, No. 5, 2000, pp. 106-108.10.1109/2.841788
  2. D. Estrin, R. Govindan, J. Heideman and S. Kumar., “Next century challenges: Scalable Coordination in Sensor Networks”, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp.263-270, USA, 1999.10.1145/313451.313556
  3. Kewei Sha, Junzhao Du, Weisong Shi, “WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs”, International Journal of Sensor Networks, Vol 1, No. 3/4, 2006, pp.156-168.10.1504/IJSNET.2006.012031
  4. Habib M.Ammari, Sajal K. Das, “A trade-off between energy and delay in data dessemination for wireless sensor networks using transmision range slicing”, Computer Communications, Vol 31, No. 9, 2008, pp.1687-1704.10.1016/j.comcom.2007.11.006
  5. Karlof C, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, Vol 1, No. 2/3, 2003, pp. 293-315.10.1016/S1570-8705(03)00008-8
  6. Y.-C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976-1986, USA, March 30 - April 3, 2003.
  7. [7]L.X. Hu and D Evans, “Using directional antennas to prevent wormhole attacks”, Proceedings of Network and Distributed System Security Symposium, USA, February 5-6, 2004.
  8. Perrig, Adrian, Trappe, Wade, Gligor, Virgil and Poovendran Radha, “Secure wireless networking” Journal of Communications and Networks, Vol 13, No. 1, 2007, pp. 323-327.10.1109/JCN.2009.6388406
  9. S. Choi and D.Y. Kim, D. H. Lee, J.I. Jung, “WAP: Wormhole attack prevention algorithm in mobile Ad Hoc networks”, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 3434-348, USA, June 11-13, 2008.
  10. S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.10.1016/j.adhoc.2008.09.005
  11. G. Lee, D. K. Kim, J. Seo, “An approach to mitigate wormhole attack in wireless Ad Hoc networks”, Proceedings of 2008 International Conference on Information Security and Assurance, pp. 220-225, Korea, April 24-26, 2009.
  12. J Zhu, KL Hung, B Bensaou, F Nait-Abdesselam, “Rate-lifetime tradeoff for reliable communication in wireless sensor networks”, Computer Networks, Vol. 52, No. 1, 2007, pp. 2543.10.1016/j.comnet.2007.09.011
  13. A. Rasheed and R. Mahapatra, “Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks”, Proceedings of the 28th IEEE International Performance Computing and Communications Conference, pp..216-222, USA, December 14-16, 2009.10.1109/PCCC.2009.5403840
  14. R. Maheshwari and J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 105-115, USA, May 6-12, 2007.10.1109/INFCOM.2007.21
  15. T. Hayajneh and P. Krishnamurthy, D. Tipper, “DeWorm: a simple protocol to detect wormhole attacks in wireless Ad hoc networks”, Proceedings of the Third International Conference on Network and System Security, pp. 73-80, Australia, October 19-21, 2009.10.1109/NSS.2009.85
  16. D. Z. Dong and M. Li, Y. H. Liu, X. Y. Li, X. K. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks”, IEEE/ACM Transactions on Networking, Vol 19, No. 6, 2011, pp. 1787-1796.10.1109/TNET.2011.2163730
  17. S. M. Jen and C. S. Laih, W. C. Kuo, “A hop-count analysis scheme for avoiding wormhole attacks in MANET”, Sensors, Vol 19, No. 6, 2009, pp. 5022-5039.10.3390/s90605022329195122408566
  18. L. J. Qian and N. Song, X. F. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach”, Journal of Network and Computer Applications, Vol 30, 2007, pp. 308-330.10.1016/j.jnca.2005.07.003
  19. A. Hatcher, “Algebraic topology”, Cambridge University Press, Cambridge, 2002.
  20. S. J. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in Ad hoc networks”, Proceedings of IEEE International Conference on Communications, pp. 3201-3205, Finland, June 11-14, 2001.
Language: English
Page range: 209 - 223
Submitted on: Nov 5, 2012
Accepted on: Jan 20, 2013
Published on: Feb 20, 2013
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 times per year

© 2013 Lan Yao, Zhibin Zhao, Ge Yu, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.