Title
Interactive Wormhole Detection in Large Scale Wireless Networks
Abstract
Wormhole attacks in wireless networks can severely deteriorate the network performance and compromise the security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple worm-hole attackers. Various visual forms have been adopted to assist the understanding and analysis of the reconstructed network topology and improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. The proposed approach demonstrates that interactive visualization can be successfully combined with network security mechanisms to greatly improve the intrusion detection capabilities
Year
DOI
Venue
2006
10.1109/VAST.2006.261435
IEEE VAST
Keywords
Field
DocType
intrusion detection,routing protocol,topology visualization,c.2.0 [computer-communication networks]: generalâ¿security and protection,interactive visualization of wormholes,interactive wormhole detection,automatic detection algorithm,wireless networks,radio networks,wormhole attacks,visualization on network security,data visualisation,h.5.2 information systems: information interfaces and presentationóuser interfaces,user interaction,interactive detection,topology visualiza- tion index terms: c.2.0 computer-communication networks: generalósecurity and protection,h.5.2 [information systems]: information interfaces and presentationâ¿user interfaces,network topology visualization,large scale wireless network,telecommunication security,visualiza- tion on network security,security of data,information system,wireless network,network performance,network security,indexing terms,real time,interactive visualization
Wireless network,Wireless,Computer science,Network security,Computer network,Network topology,Interactive visualization,Intrusion detection system,Routing protocol,Distributed computing,Network performance
Conference
ISSN
ISBN
Citations 
2325-9442
1-4244-0592-0
7
PageRank 
References 
Authors
0.56
33
2
Name
Order
Citations
PageRank
Weichao Wang150033.87
Aidong Lu235330.18