An Efficient Algorithm for the Detection of Exposed and Hidden Wormhole Attack
Keywords: Wormhole Attack, Wormhole, Mobile Ad Hoc Network, Routing Table, Round Trip Time,
Received Signal Strength Indicator
Mehran University Research Journal of Engineering & Technology
Volume 35 , Issue 3
ZUBAIR AHMED KHAN , SAEED-UR-REHMAN , MUHAMMAD HASAN ISLAM ,
References
1. |
Khan, Z.A. and Islam, M.H., "Wormhole Attack: A New
Detection Technique", IEEE International Conference
on Emerging Technologies, pp. 1-6, 2012 |
2. |
Gauri, M., Singh, R.K., and Raju, M.V., "Implementation
and Comparison of a New Wormhole Detection
Technique with Existing Techniques", International
Journal of Futuristic Science Engineering & Technology,Volume 2-4, pp. 266-273, 2013 |
3. |
Khan, Z.A., Rehman, S.U., and Islam, M.H., "An
Analytical Survey of State of the Art Wormhole
Detection and Prevention Techniques", International
Journal of Science & Engineering Research, Volume 4-6,
pp. 1723-1731, 2013. |
4. |
Hu, Y.C., Perrig, A., and Johnson, D.B., "Packet Leashes:A Defense against Wormhole Attacks in Wireless
Networks", IEEE 22nd Annual Joint Conference on
Computer and Communications, IEEE Societies,
Volume 3, pp. 1976-1986, Italy, 2013. |
5. |
Song, S., Wu, H., and Choi, B.Y., "Statistical Wormhole
Detection for Mobile Sensor Networks", IEEE 4th
International Conference on Ubiquitous and Future
Networks, Volume 1, pp. 322-327, Thailand, 2012. |
6. |
Raju, V.K., and Kumar, K.V., "A Simple and Efficient
Mechanism to Detect and Avoid Wormhole Attacks In
Mobile Ad Hoc Networks", IEEE International
Conference on Computing Sciences, Volume 1,
pp. 271-275, Omaha, 2012 |
7. |
Simsek, O., and Levi, A., “A Distributed Scheme to Detect
Wormhole Attacks in Mobile Wireless Sensor Networks",
Computer and Information Sciences-II, pp. 157-163,
Springer, 2012 |
8. |
Jain, S., and Baras, J.S., "Preventing Wormhole Attacks
using Physical Layer Authentication", IEEE Conference
on Wireless Communications and Networking,
pp. 2712—2717, 2012. |
9. |
Upadhyay, S., and Chaurasia, B.K., "Detecting and
Avoiding Wormhole Attack in MANET Using Statistical
Analysis Approach", Advances in Computer Science and
Information Technology, Networks and Communications, pp. 402-408, Springer, 2012 |
10. |
Song, S., Wu, H., and Choi, B.Y., "Statistical Wormhole
Detection for Mobile Sensor Networks", IEEE 4th
International Conference on Ubiquitous and Future
Networks, Volume 1, pp. 322-327, Thailand, 2012. |
11. |
Modirkhazeni, A., Aghamahmoodi, S., and Niknejad, N.,
"Distributed Approach to Mitigate Wormhole Attack in
Wireless Sensor Networks", IEEE 7th International
Conference on Networked Computing, pp. 122-128,
2011. |
12. |
Vani, A., and Rao, D.S., "A Simple Algorithm for
Detection and Removal of Wormhole Attacks for Secure
Routing In Ad Hoc Wireless Networks", International
Journal on Computer Science & Engineering, Volume 3,
No. 6, pp. 2377-2384, 2011. |
13. |
Vijayalakshmi, S., and Albert, R.S., "Weeding Wormhole
Attack in MANET Multicast Routing Using Two Novel
Techniques-LP3 and NAWA2", International Journal of
Computer Applications, Volume 16, No. 7, pp. 26-33,
2011 |
14. |
Tran, P.V., Hung, Y.-K.L., Lee, S., and Lee, H., "Ttm:
An Efficient Mechanism to Detect Wormhole Attacks
in Wireless Ad-Hoc Networks", 4th IEEE Conference
on Consumer Communications and Networking,
pp. 593-598, 2007. |
15. |
Chiu, H.S., and Lui, K.-S. , "DELPHI: Wormhole
Detection Mechanism for Ad Hoc Wireless Networks",
Proceeding of International Symposium on Wireless
Pervasive Computing, pp. 1-1, 2006. |
16. |
Capkun, S., Buttyán, L., and Hubaux, J.-P. , "SECTOR:
Secure Traking of Node Encouters in Multi-Hop Wireless Networks", 1st ACM Workshop on Security of Ad hoc
and Sensor Networks, pp. 21-32, 2003. |
17. |
Masiero, R., Rossi, M., and Woods, J.C. , "RSSI Based
Tracking Algorithms for Wireless Sensor Networks:
Theoretical Aspects And Performance Evaluation",
Ph.D. Thesis, Corso di Laurea Specialistica in Ingegneria delle Telecomunicazioni, 2007 |
18. |
Hussain, S., and Rahman, M.S., "Using Received Signal
Strength Indicator to Detect Node Replacement and
Replication Attacks in Wireless Sensor Networks",
International Society for Optics and Photonics, SPIE
Defense, Security, and Sensing, pp. 73440G-73440G,
2009. |
19. |
Papamanthou, C., Preparata, F.P., and Tamassia, R.,
"Algorithms for Location Estimation Based on Rssi
Sampling", Algorithmic Aspects of Wireless Sensor
Networks, pp. 72-86, Springer, 2008. |
20. |
Guoqiang, Y., Weijun, D., Chao, M., and Liang, H., "RSSI Vector Attack Detection Method for Wireless Sensor
Networks", IEEE 3rd International Conference on
Communication Software and Networks, pp. 229-232,
2011. |
21. |
Peraz, D.L., and Klepal, M., "Measuring Round Trip
Times for Distance Estimation Between WLAN Nodes",
, Cork Institute of technology, Ireland, Technical Report,
Ireland, 2006 |
22. |
Xu, J., Liu, W., Lang, F., Zhang, Y., and Wang, C.,
"Distance Measurement Model Based on RSSI in WSN",
Scientific Research Publishing, Wireless Sensor Network,
Volume 2, pp. 606, 2010. |
|
|
|