Time-based detection and location of wormhole attacks in wireless ad hoc networks

Fei Shi, Dongxu Jin, Weijie Liu, Jooseok Song

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.

Original languageEnglish
Title of host publicationProc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011
Pages1721-1726
Number of pages6
DOIs
Publication statusPublished - 2011 Dec 1
Event10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011 - Changsha, China
Duration: 2011 Nov 162011 Nov 18

Other

Other10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011
CountryChina
CityChangsha
Period11/11/1611/11/18

Fingerprint

Wireless ad hoc networks

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Software

Cite this

Shi, F., Jin, D., Liu, W., & Song, J. (2011). Time-based detection and location of wormhole attacks in wireless ad hoc networks. In Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011 (pp. 1721-1726). [6121037] https://doi.org/10.1109/TrustCom.2011.240
Shi, Fei ; Jin, Dongxu ; Liu, Weijie ; Song, Jooseok. / Time-based detection and location of wormhole attacks in wireless ad hoc networks. Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. 2011. pp. 1721-1726
@inproceedings{2170564950cf423b95551121d5e346bd,
title = "Time-based detection and location of wormhole attacks in wireless ad hoc networks",
abstract = "Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.",
author = "Fei Shi and Dongxu Jin and Weijie Liu and Jooseok Song",
year = "2011",
month = "12",
day = "1",
doi = "10.1109/TrustCom.2011.240",
language = "English",
isbn = "9780769546001",
pages = "1721--1726",
booktitle = "Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011",

}

Shi, F, Jin, D, Liu, W & Song, J 2011, Time-based detection and location of wormhole attacks in wireless ad hoc networks. in Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011., 6121037, pp. 1721-1726, 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on Frontier of Computer Science and Technology, FCST 2011, Changsha, China, 11/11/16. https://doi.org/10.1109/TrustCom.2011.240

Time-based detection and location of wormhole attacks in wireless ad hoc networks. / Shi, Fei; Jin, Dongxu; Liu, Weijie; Song, Jooseok.

Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. 2011. p. 1721-1726 6121037.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Time-based detection and location of wormhole attacks in wireless ad hoc networks

AU - Shi, Fei

AU - Jin, Dongxu

AU - Liu, Weijie

AU - Song, Jooseok

PY - 2011/12/1

Y1 - 2011/12/1

N2 - Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.

AB - Nowadays, wireless ad hoc networks become more and more popular and significant in many fields. However, the important applications of wireless ad hoc networks make them very attractive to attackers. Moreover, the deployment scenarios, the functionality requirements and the limited capabilities of these types of networks make them vulnerable to a large group of attacks, e.g., wormhole attacks concerned in this paper. We propose a time-based scheme for the purpose of preventing wormhole attacks in wireless ad hoc networks. The scheme includes two phases which are detection phase and location phase. By detection phase, the existence of wormhole attacks can be detected. By location phase, the wormhole nodes can be identified. Simulation results show that our scheme is feasible and efficient in preventing wormhole attacks.

UR - http://www.scopus.com/inward/record.url?scp=84862909481&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84862909481&partnerID=8YFLogxK

U2 - 10.1109/TrustCom.2011.240

DO - 10.1109/TrustCom.2011.240

M3 - Conference contribution

AN - SCOPUS:84862909481

SN - 9780769546001

SP - 1721

EP - 1726

BT - Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011

ER -

Shi F, Jin D, Liu W, Song J. Time-based detection and location of wormhole attacks in wireless ad hoc networks. In Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. 2011. p. 1721-1726. 6121037 https://doi.org/10.1109/TrustCom.2011.240