Title
Interactive wormhole detection and evaluation
Abstract
Wormhole attacks in wireless networks can severely deteriorate network performance and compromise security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large-scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple wormhole attackers. Various visual forms have been adopted to assist in the understanding and analysis of reconstructed network topology and to improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. We have performed user studies to evaluate the effectiveness of our approach and demonstrate that visual analysis can be successfully combined with network security mechanisms to greatly improve intrusion detection capabilities.
Year
DOI
Venue
2007
10.1057/palgrave.ivs.9500144
Information Visualization
Keywords
Field
DocType
compromise security,wireless network,automatic detection algorithm,detection accuracy,interactive detection,large-scale wireless network,topology visualization,reconstructed network topology,wireless networks,intrusion detection capability,network security mechanism,wormhole attack,network performance,wormhole attacks,visualization on network security,interactive wormhole detection,network topology,real time,interactive visualization,intrusion detection,visual analysis,information visualization,network security
Wireless network,Wireless,Computer science,Network security,Computer network,Network topology,Interactive visualization,Intrusion detection system,Network performance,Routing protocol
Journal
Volume
Issue
Citations 
6
1
10
PageRank 
References 
Authors
0.54
39
2
Name
Order
Citations
PageRank
Weichao Wang150033.87
Aidong Lu235330.18