Topological comparison-based wormhole detection for MANET

Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depend...

Full description

Bibliographic Details
Main Authors: Chan, King-Sun, Alam, Mohammad
Format: Journal Article
Published: John Wiley & Sons 2014
Subjects:
Online Access:http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf
http://hdl.handle.net/20.500.11937/15532
_version_ 1848748918145286144
author Chan, King-Sun
Alam, Mohammad
author_facet Chan, King-Sun
Alam, Mohammad
author_sort Chan, King-Sun
building Curtin Institutional Repository
collection Online Access
description Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormhole attack can be further divided into two categories: traditional wormhole attack and Byzantine wormhole attack. Existing researches focusing on detecting traditional wormhole attacks can be classified into three categories: one-hop delay-based approach, topological analysis-based or special hardware/middleware-based approaches. Unfortunately, they all have their own limitations. Most of the researches detecting Byzantine wormhole attack are not addressing the Byzantine wormhole attack directly. Instead, they focus on observing the consequence after a Byzantine wormhole attack, like packet dropping or modification. In this paper, we propose to detect both traditional and Byzantine wormhole attacks by detecting some topological anomalies introduced by wormhole tunnels. Simulation results show that our scheme can achieve both high wormhole attack detection rate and accuracy. Our scheme is also simple to implement.
first_indexed 2025-11-14T07:12:40Z
format Journal Article
id curtin-20.500.11937-15532
institution Curtin University Malaysia
institution_category Local University
last_indexed 2025-11-14T07:12:40Z
publishDate 2014
publisher John Wiley & Sons
recordtype eprints
repository_type Digital Repository
spelling curtin-20.500.11937-155322019-02-19T04:26:27Z Topological comparison-based wormhole detection for MANET Chan, King-Sun Alam, Mohammad MANET topological comparison Byzantine wormhole attack RTT wormhole attack Wormhole attack is considered one of the most threatening security attacks for mobile ad hoc networks. In a wormhole attack, a tunnel is setup in advance between two colluders. The colluders record packets at one location and forward them through the tunnel to another location in the network. Depending on whether or not the colluders are participating in the network functions, the wormhole attack can be further divided into two categories: traditional wormhole attack and Byzantine wormhole attack. Existing researches focusing on detecting traditional wormhole attacks can be classified into three categories: one-hop delay-based approach, topological analysis-based or special hardware/middleware-based approaches. Unfortunately, they all have their own limitations. Most of the researches detecting Byzantine wormhole attack are not addressing the Byzantine wormhole attack directly. Instead, they focus on observing the consequence after a Byzantine wormhole attack, like packet dropping or modification. In this paper, we propose to detect both traditional and Byzantine wormhole attacks by detecting some topological anomalies introduced by wormhole tunnels. Simulation results show that our scheme can achieve both high wormhole attack detection rate and accuracy. Our scheme is also simple to implement. 2014 Journal Article http://hdl.handle.net/20.500.11937/15532 http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf John Wiley & Sons restricted
spellingShingle MANET
topological comparison
Byzantine wormhole attack
RTT
wormhole attack
Chan, King-Sun
Alam, Mohammad
Topological comparison-based wormhole detection for MANET
title Topological comparison-based wormhole detection for MANET
title_full Topological comparison-based wormhole detection for MANET
title_fullStr Topological comparison-based wormhole detection for MANET
title_full_unstemmed Topological comparison-based wormhole detection for MANET
title_short Topological comparison-based wormhole detection for MANET
title_sort topological comparison-based wormhole detection for manet
topic MANET
topological comparison
Byzantine wormhole attack
RTT
wormhole attack
url http://onlinelibrary.wiley.com/doi/10.1002/dac.2397/epdf
http://hdl.handle.net/20.500.11937/15532