MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Wormholes no more? localized wormhole detection and prevention in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Journal of Computer and System Sciences
Hi-index | 0.00 |
Verifying physical presence of a neighbor in wireless ad hoc networks is one of the key components in developing protocols resilient to replay-based attacks. For this, we first consider RTT-based and power-based approaches. We then couple them to design an effective neighbor verification protocol (NVP). In theory, we always see some room for replay-based attacks. However, our proposed protocol significantly limits the effectiveness of replay-based attacks by restricting the range where they might be launched and thus makes them practically impossible.