Surface reconstruction from unorganized points
SIGGRAPH '92 Proceedings of the 19th annual conference on Computer graphics and interactive techniques
The Cricket location-support system
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Dynamic fine-grained localization in Ad-Hoc networks of sensors
Proceedings of the 7th annual international conference on Mobile computing and networking
Using directional antennas for medium access control in ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Robotics-based location sensing using wireless ethernet
Proceedings of the 8th annual international conference on Mobile computing and networking
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
ATEC '02 Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference
Localization from mere connectivity
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
A Secure Routing Protocol for Ad Hoc Networks TITLE2:
Secure verification of location claims
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
An easy-to-code smoothing algorithm for 3D reconstructed surfaces
Graphics programming methods
Semidefinite programming for ad hoc wireless sensor network localization
Proceedings of the 3rd international symposium on Information processing in sensor networks
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Vehicle classification in distributed sensor networks
Journal of Parallel and Distributed Computing
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Proceedings of the 4th ACM workshop on Wireless security
Topological hole detection in wireless sensor networks and its applications
DIALM-POMC '05 Proceedings of the 2005 joint workshop on Foundations of mobile computing
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of range-free anchor-free localization in a wsn under wormhole attack
Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems
Interactive wormhole detection and evaluation
Information Visualization
Visualisation of wormholes in underwater sensor networks: a distributed approach
International Journal of Security and Networks
Secure localization with phantom node detection
Ad Hoc Networks
Towards provable secure neighbor discovery in wireless networks
Proceedings of the 6th ACM workshop on Formal methods in security engineering
A practical secure neighbor verification protocol for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Wireless sensor network wormhole avoidance using disturbance-based routing schemes
ISWCS'09 Proceedings of the 6th international conference on Symposium on Wireless Communication Systems
A secure localization approach against wormhole attacks using distance consistency
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network algorithms, systems, and applications
A security analysis for wireless sensor mesh networks in highly critical systems
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Modelling and analysis of attacks on the MANET routing in AODV
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Improving sensor network security with information quality
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Statistical wormhole detection in sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Local connectivity tests to identify wormholes in wireless networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Wormholes no more? localized wormhole detection and prevention in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
A scalable wireless routing protocol secure against route truncation attacks
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies
Mobile Networks and Applications
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Topological detection on wormholes in wireless ad hoc and sensor networks
IEEE/ACM Transactions on Networking (TON)
Proceedings of the Tenth Workshop on Visualization for Cyber Security
Journal of Computer and System Sciences
Hi-index | 0.00 |
Several protocols have been proposed to defend against wormholes in ad hoc networks by adopting positioning devices, synchronized clocks, or directional antennas. In this paper, we propose a mechanism, MDS-VOW, to detect wormholes in a sensor network. MDS-VOW first reconstructs the layout of the sensors using multi-dimensional scaling. To compensate the distortions caused by distance measurement errors, a surface smoothing scheme is adopted. MDS-VOW then detects the wormhole by visualizing the anomalies introduced by the attack. The anomalies, which are caused by the fake connections through the wormhole, bend the reconstructed surface to pull the sensors that are faraway to each other. Through detecting the bending feature, the wormhole is located and the fake connections are identified. The contributions of MDS-VOW are: (1) it does not require the sensors to be equipped with special hardware, (2) it adopts and combines the techniques from social science, computer graphics, and scientific visualization to attack the problem in network security. We examine the accuracy of the proposed mechanism when the sensors are deployed in a circle area and one wormhole exists in the network. The results show that MDS-VOW has a low false alarm ratio when the distance measurement errors are not large.