Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Using directional antennas for medium access control in ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
Distributed algorithms for guiding navigation across a sensor network
Proceedings of the 9th annual international conference on Mobile computing and networking
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Visualization of wormholes in sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks
IEEE Transactions on Mobile Computing
Sensor Networks for Emergency Response: Challenges and Opportunities
IEEE Pervasive Computing
Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
Verifying Physical Presence of Neighbors against Replay-based Attacks in Wireless Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
CenWits: a sensor-based loosely coupled search and rescue system using witnesses
Proceedings of the 3rd international conference on Embedded networked sensor systems
Deploying a Wireless Sensor Network on an Active Volcano
IEEE Internet Computing
Defending against wormhole attacks in mobile ad hoc networks: Research Articles
Wireless Communications & Mobile Computing
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Key management for long-lived sensor networks in hostile environments
Computer Communications
Distributed Mobility Management for Target Tracking in Mobile Sensor Networks
IEEE Transactions on Mobile Computing
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Interactive wormhole detection and evaluation
Information Visualization
TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
The BikeNet mobile sensing system for cyclist experience mapping
Proceedings of the 5th international conference on Embedded networked sensor systems
Transmission Time-Based Mechanism to Detect Wormhole Attacks
APSCC '07 Proceedings of the The 2nd IEEE Asia-Pacific Service Computing Conference
Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 02
Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge
NCA '08 Proceedings of the 2008 Seventh IEEE International Symposium on Network Computing and Applications
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Proceedings of the 6th ACM conference on Embedded network sensor systems
Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side
WIMOB '08 Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication
WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
WASA '08 Proceedings of the Third International Conference on Wireless Algorithms, Systems, and Applications
Cooperative Intrusion Detection in Wireless Sensor Networks
EWSN '09 Proceedings of the 6th European Conference on Wireless Sensor Networks
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Protecting Neighbor Discovery Against Node Compromises in Sensor Networks
ICDCS '09 Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
Statistical wormhole detection in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Security in mobile ad hoc networks: challenges and solutions
IEEE Wireless Communications
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking
IEEE Communications Magazine
Wormhole attacks in wireless networks
IEEE Journal on Selected Areas in Communications
Context-aware wireless sensor networks for assisted living and residential monitoring
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Several protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. These requirements and assumptions limit their applicability especially in the case of mobile networks where the degree of association and de-association between the nodes is relatively high. In this work, we present a novel lightweight countermeasure for the wormhole attack, called LDAC (Localized-Decentralized Algorithm for Countering wormholes). It is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information, as implied by the underlying communication graph. LDAC is not confined to static networks but extends naturally to dynamic and even mobile ones. Rigorous arguments that prove the correctness of the algorithm are coupled with detailed performance evaluation along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.