Academic
Publications
Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]

Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks],10.1109/MWC.2010.5601956,IEEE Wireless Comm

Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks]  
BibTex | RIS | RefWorks Download
Delay-tolerant networks are especially useful in providing mission-critical services including emergency scenarios and battlefield applications. However, DTNs are vulnerable to wormhole attacks, in which a malicious node records the packets at one location and tunnels them to another colluding node, which relays them locally into the network. Wormhole attacks are a severe threat to normal network operation in DTNs. In this article we describe various methods that have been developed to detect wormhole attacks. However, most of them cannot work efficiently in DTNs. To detect the presence of a wormhole attack, we propose a detection mechanism that exploits the existence of a forbidden topology in the network. We evaluated our approach through extensive simulations using both Random Way Point and Zebranet mobility models. Our results show that the proposed method can detect wormhole attacks efficiently and effectively in DTNs.
Journal: IEEE Wireless Communications , vol. 17, no. 5, pp. 36-42, 2010
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.