TY - GEN
T1 - Time-based detection and location of wormhole attacks in wireless ad hoc networks
AU - Shi, Fei
AU - Jin, Dongxu
AU - Liu, Weijie
AU - Song, Jooseok
PY - 2011
Y1 - 2011
N2 - Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
AB - Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.
UR - http://www.scopus.com/inward/record.url?scp=84862909481&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84862909481&partnerID=8YFLogxK
U2 - 10.1109/TrustCom.2011.240
DO - 10.1109/TrustCom.2011.240
M3 - Conference contribution
AN - SCOPUS:84862909481
SN - 9780769546001
T3 - Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011
SP - 1721
EP - 1726
BT - Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011
T2 - 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011
Y2 - 16 November 2011 through 18 November 2011
ER -