Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Defending against wormhole attacks in mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing
A practical evaluation of radio signal strength for ranging-based localization
ACM SIGMOBILE Mobile Computing and Communications Review
Wireless sensor network localization techniques
Computer Networks: The International Journal of Computer and Telecommunications Networking
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
In this paper, a technique for detection of wormhole attacks based on distance verification is proposed for mobile ad hoc network (MANETs) applications. A node estimates its distances to a sender node based on the received signal strength (RSS) of received packets, and uses them to verify against the distances computed from the location information in the packets. The verification is formulated as a hypothesis testing problem and a Neyman-Pearson approach is used to decide whether the sender node is under wormhole attack or not. An implementation of the Optimized Link State Routing (OLSR) protocol is discussed. A simple collaborative decision-making strategy is proposed to counter the limitations of distance verification by a single node. The proposed technique is computationally efficient. It is able to provide statistical performance measures for the detection results, an important component that has been missing in existing wormhole detection techniques. Finally, computer simulations are used to demonstrate the effectiveness and performance of the proposed technique.