Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Intrusion Detection Techniques in Wireless Ad Hoc Networks
COMPSAC '06 Proceedings of the 30th Annual International Computer Software and Applications Conference - Volume 02
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
COMPSAC '07 Proceedings of the 31st Annual International Computer Software and Applications Conference - Volume 01
Transmission Time-Based Mechanism to Detect Wormhole Attacks
APSCC '07 Proceedings of the The 2nd IEEE Asia-Pacific Service Computing Conference
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Authenticated routing for ad hoc networks
IEEE Journal on Selected Areas in Communications
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
International Journal of Ad Hoc and Ubiquitous Computing
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.00 |
This study proposes an approach to deploy a node implementing Intrusion Detection System (IDS) in MANETs for detecting and isolating wormhole nodes, if they exist. All IDS nodes must be set in sniffing mode to execute a mechanism called Anti-Wormhole Mechanism (AWM). An IDS node will broadcast a block message to all nodes within its communication range when a neighbouring node's suspicious value exceeds the threshold. This study uses ns2 to evaluate the proposed IDS nodes, and the results show that these IDSs can rapidly and correctly block the wormhole nodes under the circumstances of low false positives.