Mehran University Research Journal Of Engineering &
Technology (HEC Recognized In Category "X")
Publishing Since 1982.



For Authors
For Readers
Article Information  
An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack

Keywords: Wormhole Attack, Wormhole, Mobile Ad Hoc Network, Routing Table, Round Trip Time, Received Signal Strength Indicator

Mehran University Research Journal of Engineering & Technology

Volume 35 ,  Issue 3

ZUBAIR  AHMED  KHAN , SAEED-UR-REHMAN   , MUHAMMAD HASAN ISLAM   ,

References
1. Khan, Z.A. and Islam, M.H., "Wormhole Attack: A New Detection Technique", IEEE International Conference on Emerging Technologies, pp. 1-6, 2012
2. Gauri, M., Singh, R.K., and Raju, M.V., "Implementation and Comparison of a New Wormhole Detection Technique with Existing Techniques", International Journal of Futuristic Science Engineering & Technology,Volume 2-4, pp. 266-273, 2013
3. Khan, Z.A., Rehman, S.U., and Islam, M.H., "An Analytical Survey of State of the Art Wormhole Detection and Prevention Techniques", International Journal of Science & Engineering Research, Volume 4-6, pp. 1723-1731, 2013.
4. Hu, Y.C., Perrig, A., and Johnson, D.B., "Packet Leashes:A Defense against Wormhole Attacks in Wireless Networks", IEEE 22nd Annual Joint Conference on Computer and Communications, IEEE Societies, Volume 3, pp. 1976-1986, Italy, 2013.
5. Song, S., Wu, H., and Choi, B.Y., "Statistical Wormhole Detection for Mobile Sensor Networks", IEEE 4th International Conference on Ubiquitous and Future Networks, Volume 1, pp. 322-327, Thailand, 2012.
6. Raju, V.K., and Kumar, K.V., "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks In Mobile Ad Hoc Networks", IEEE International Conference on Computing Sciences, Volume 1, pp. 271-275, Omaha, 2012
7. Simsek, O., and Levi, A., “A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks", Computer and Information Sciences-II, pp. 157-163, Springer, 2012
8. Jain, S., and Baras, J.S., "Preventing Wormhole Attacks using Physical Layer Authentication", IEEE Conference on Wireless Communications and Networking, pp. 2712—2717, 2012.
9. Upadhyay, S., and Chaurasia, B.K., "Detecting and Avoiding Wormhole Attack in MANET Using Statistical Analysis Approach", Advances in Computer Science and Information Technology, Networks and Communications, pp. 402-408, Springer, 2012
10. Song, S., Wu, H., and Choi, B.Y., "Statistical Wormhole Detection for Mobile Sensor Networks", IEEE 4th International Conference on Ubiquitous and Future Networks, Volume 1, pp. 322-327, Thailand, 2012.
11. Modirkhazeni, A., Aghamahmoodi, S., and Niknejad, N., "Distributed Approach to Mitigate Wormhole Attack in Wireless Sensor Networks", IEEE 7th International Conference on Networked Computing, pp. 122-128, 2011.
12. Vani, A., and Rao, D.S., "A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks", International Journal on Computer Science & Engineering, Volume 3, No. 6, pp. 2377-2384, 2011.
13. Vijayalakshmi, S., and Albert, R.S., "Weeding Wormhole Attack in MANET Multicast Routing Using Two Novel Techniques-LP3 and NAWA2", International Journal of Computer Applications, Volume 16, No. 7, pp. 26-33, 2011
14. Tran, P.V., Hung, Y.-K.L., Lee, S., and Lee, H., "Ttm: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-Hoc Networks", 4th IEEE Conference on Consumer Communications and Networking, pp. 593-598, 2007.
15. Chiu, H.S., and Lui, K.-S. , "DELPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks", Proceeding of International Symposium on Wireless Pervasive Computing, pp. 1-1, 2006.
16. Capkun, S., Buttyán, L., and Hubaux, J.-P. , "SECTOR: Secure Traking of Node Encouters in Multi-Hop Wireless Networks", 1st ACM Workshop on Security of Ad hoc and Sensor Networks, pp. 21-32, 2003.
17. Masiero, R., Rossi, M., and Woods, J.C. , "RSSI Based Tracking Algorithms for Wireless Sensor Networks: Theoretical Aspects And Performance Evaluation", Ph.D. Thesis, Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni, 2007
18. Hussain, S., and Rahman, M.S., "Using Received Signal Strength Indicator to Detect Node Replacement and Replication Attacks in Wireless Sensor Networks", International Society for Optics and Photonics, SPIE Defense, Security, and Sensing, pp. 73440G-73440G, 2009.
19. Papamanthou, C., Preparata, F.P., and Tamassia, R., "Algorithms for Location Estimation Based on Rssi Sampling", Algorithmic Aspects of Wireless Sensor Networks, pp. 72-86, Springer, 2008.
20. Guoqiang, Y., Weijun, D., Chao, M., and Liang, H., "RSSI Vector Attack Detection Method for Wireless Sensor Networks", IEEE 3rd International Conference on Communication Software and Networks, pp. 229-232, 2011.
21. Peraz, D.L., and Klepal, M., "Measuring Round Trip Times for Distance Estimation Between WLAN Nodes", , Cork Institute of technology, Ireland, Technical Report, Ireland, 2006
22. Xu, J., Liu, W., Lang, F., Zhang, Y., and Wang, C., "Distance Measurement Model Based on RSSI in WSN", Scientific Research Publishing, Wireless Sensor Network, Volume 2, pp. 606, 2010.