Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies
Mobile Networks and Applications
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or conznzunication time over each link during the route establishment, which requires special hardware or causes overhead on all links even though only one link on each route could be affected by a wormhole attack.In this article, we propose an end-to-end detection of wormhole attack (EDWA) in wireless ad-hoc networks. We first present the wormhole detection which is based on the smallest hop count estimation between source and destination. If the hop count of a received shortest route is much smaller than the estimated value an alert of wormhole attack is raised at the source node. Then the source node will start a wormhole TRACING procedure to identify the two end points of the wormhole. Finally, a legitimate route is selected for data communication. Both our analysis and simulation results show that the end-to-end wormhole detection method is effective when the source and destination are not too far away.