A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
Probabilistic routing in intermittently connected networks
ACM SIGMOBILE Mobile Computing and Communications Review
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Delay- and Disruption-Tolerant Networking
Delay- and Disruption-Tolerant Networking
Delay/disruption tolerant mobile ad hoc networks: latest developments: Research Articles
Wireless Communications & Mobile Computing - Wireless Ad Hoc and Sensor Networks
Single-Adversary Relaying Attack Defense Mechanism in Wireless Ad Hoc Networks
Wireless Personal Communications: An International Journal
Taxonomy of Fundamental Concepts of Localization in Cyber-Physical and Sensor Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.01 |
Delay-tolerant networks are especially useful in providing mission-critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which relays them locally into the network. Wormhole attacks are a severe threat to normal network operation in DTNs. In this article we describe various methods that have been developed to detect wormhole attacks. However, most of them cannot work efficiently in DTNs. To detect the presence of a wormhole attack, we propose a detection mechanism that exploits the existence of a forbidden topology in the network. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that the proposed method can detect wormhole attacks efficiently and effectively in DTNs.