Title
Defending against wormhole attacks in mobile ad hoc networks
Abstract
In ad hoc networks, malicious nodes can deploy wormhole attacks to fabricate a false scenario on the proximity relationship among mobile nodes. A classification of the attacks according to the format of the wormholes is proposed. This forms a basis to identify the detection capability of various approaches. An analysis shows that earlier approaches focus on the prevention of wormholes among neighbors that trust each other. As a more generic approach, we present an end-to-end scheme that can detect wormholes on a multi-hop route. Only the trust between the source and the destination is assumed. The mechanism uses geographic information to detect anomalies in neighbor relations and node movements. To reduce the computation and storage overhead, we present a scheme called cell-based open tunnel avoidance (COTA) to manage the information. COTA requires a constant space for every node on the path and the computation overhead increases linearly to the number of detection packets. We prove that the savings do not deteriorate the detection capability. Various schemes to control communication overhead are studied. The simulation and experiments on real devices show that the proposed mechanism can be combined with existent routing protocols to defend against wormhole attacks. Copyright (C) 2006 John Wiley & Sons, Ltd.
Year
DOI
Venue
2006
10.1002/wcm.292
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Keywords
Field
DocType
ad hoc network,wormhole attacks,end-to-end mechanism,overhead control
Mobile ad hoc network,Computer science,Network packet,Computer network,Transmission protocol,Wireless ad hoc network,Wormhole,Distributed computing,Routing protocol,Computation
Journal
Volume
Issue
ISSN
6.0
4.0
1530-8669
Citations 
PageRank 
References 
39
1.38
50
Authors
4
Name
Order
Citations
PageRank
Weichao Wang150033.87
Bharat K. Bhargava23451782.34
Yi Lu31537.70
Xiaoxin Wu447538.35