메뉴 건너뛰기




Volumn 6, Issue 3, 2008, Pages 344-362

MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks

Author keywords

Mobile ad hoc networks; Neighbor watch; Node isolation; Secure neighbor discovery; Wormhole attack

Indexed keywords

ANTENNA ARRAYS; COMPUTER HARDWARE; COMPUTER SIMULATION; PACKET NETWORKS; SECURITY OF DATA; SENSOR NETWORKS;

EID: 37549006809     PISSN: 15708705     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.adhoc.2007.02.001     Document Type: Article
Times cited : (76)

References (46)
  • 1
    • 84904904836 scopus 로고    scopus 로고
    • K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002, pp. 78-87.
  • 2
    • 84961572484 scopus 로고    scopus 로고
    • Y.-C. Hu, D.B. Johnson, A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), 2002, pp. 3-13.
  • 3
    • 85177175581 scopus 로고    scopus 로고
    • Y.-C. Hu, A. Perrig, D.B. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: ACM MobiCom'02, 2002, pp. 12-23.
  • 4
    • 37549004191 scopus 로고    scopus 로고
    • P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002).
  • 5
    • 37549019099 scopus 로고    scopus 로고
    • C. Intanagonwiwat, R. Govindan, D. Estrin, Directed diffusion: a scalable and robust communication paradigm for sensor networks, in: ACM MobiCom'00, 2000, pp. 65-67.
  • 7
    • 84904578657 scopus 로고    scopus 로고
    • F. Ye, A. Chen, S. Lu, L. Zhang, A scalable solution to minimum cost forwarding in large sensor networks, in: 10th International Conference on Computer Communications and Networks (ICCCN), 2001, pp. 304-309.
  • 8
    • 0036986248 scopus 로고    scopus 로고
    • D. Braginsky, D. Estrin, Rumor routing algorithm for sensor networks, in: 1st ACM International Workshop on Wireless Sensor Networks and Applications (WSNA), 2002 pp. 22-31.
  • 9
    • 85031307530 scopus 로고    scopus 로고
    • C.E. Perkins, P. Bhagwat, Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, in: ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, 1994, pp. 234-244.
  • 10
    • 37549040388 scopus 로고    scopus 로고
    • C. Karlof, Y. Li, J. Polastre, ARRIVE: Algorithm for Robust Routing in Volatile Environments, Technical Report UCB/CSD-03-1233, March 2003.
  • 11
    • 84942426861 scopus 로고    scopus 로고
    • C. Karlof, D. Wagner, Secure routing in sensor networks: attacks and countermeasures, in: 1st IEEE International Workshop on Sensor Network Protocols and Applications, 2003.
  • 12
    • 85177501245 scopus 로고    scopus 로고
    • S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MobiCom'00, 2000, pp. 255-265.
  • 13
    • 0041973497 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: IEEE INFOCOM, 2003, pp. 1976-1986.
  • 14
    • 37549067536 scopus 로고    scopus 로고
    • L. Hu, D. Evans, Using directional antennas to prevent wormhole attacks, in: Network and Distributed System Security Symposium, 2004, pp. 131-141.
  • 15
    • 27544468419 scopus 로고    scopus 로고
    • I. Khalil, S. Bagchi, N.B. Shroff, LiteWorp: a lightweight countermeasure for the wormhole attack in multihop wireless networks, in: International Conference on Dependable Systems and Networks (DSN), 2005, pp. 612-621.
  • 16
    • 1542317831 scopus 로고    scopus 로고
    • Y.C. Hu, A. Perrig, D. Johnson, Rushing attacks and defense in wireless ad hoc network routing protocols, in: ACM Workshop on Wireless Security (WiSe'03), 2003, pp. 30-40.
  • 17
    • 37549006577 scopus 로고    scopus 로고
    • A. Qayyum, L. Viennot, A. Laouiti, Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks, Technical Report Research Report RR-3898, project HIPEERCOM, INRIA, February 2000.
  • 18
    • 0032669825 scopus 로고    scopus 로고
    • B. Bellur, R.G. Ogier, A reliable, efficient topology broadcast for dynamic networks, in: IEEE INFOCOM'99, 1999, pp. 178-186.
  • 19
    • 37549071249 scopus 로고    scopus 로고
    • B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, Mitigating Byzantine Attacks in Ad Hoc Wireless Networks, Department of Computer Science, Johns Hopkins University, Tech. Rep. Version 1, March 2004.
  • 20
    • 4544259841 scopus 로고    scopus 로고
    • S. Capkun, L. Buttyán, J.-P. Hubaux, SECTOR: secure tracking of node encounters in multi-hop wireless networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 03), 2003, pp.21-32.
  • 21
    • 0242696192 scopus 로고    scopus 로고
    • S. Buchegger, J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol, in: ACM MobiHoc, 2002, pp. 226-236.
  • 22
    • 37549054248 scopus 로고    scopus 로고
    • Ralph C. Merkle, Protocols for public key cryptosystems, in: Proceedings of the IEEE Symposium on Security and Privacy, 1980.
  • 23
    • 37549069105 scopus 로고    scopus 로고
    • The Network Simulator - ns-2. .
  • 24
    • 0035425905 scopus 로고    scopus 로고
    • A. Nasipuri, R. Castaneda, S.R. Das, Performance of multipath routing for on-demand protocols in mobile ad hoc networks, in: ACM Mobile Networks and Applications (MONET), 2001, pp. 339-349.
  • 25
    • 37549021667 scopus 로고    scopus 로고
    • A.A. Pirzada, C. McDonald, Establishing trust in pure ad hoc networks, in: Proceedings of 27th Australasian Computer Science Conference (ACSC'04), 2004, pp. 47-54.
  • 26
    • 4544258840 scopus 로고    scopus 로고
    • Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), 2003, pp. 135-147.
  • 27
    • 37549039250 scopus 로고    scopus 로고
    • J. Hightower, G. Borriello, Location sensing techniques, Technical Report of the University of Washington CS Department, UW-CSE-01-07-01, July 2001.
  • 28
    • 85084163355 scopus 로고    scopus 로고
    • C. Savarese, J. Rabaey, K. Langendoen, Robust positioning algorithms for distributed ad hoc wireless sensor networks, in: USENIX Technical Annual Conference, 2002.
  • 29
    • 0034548432 scopus 로고    scopus 로고
    • J. Li, J. Jannotti, D.S.J. De Couto, D.R. Karger, R. Morris, A scalable location service for geographic ad hoc routing, in: ACM MobiCom, 2000, pp. 120-130.
  • 30
    • 15344343328 scopus 로고    scopus 로고
    • J.-H. Song, V. Wong, V. Leung, Network protocols: a framework of secure location service for position-based ad hoc routing, in: Proceedings of the 1st ACM international workshop on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004, pp. 99-106.
  • 31
    • 11244309139 scopus 로고    scopus 로고
    • W. Wang, B. Bhargava, Visualization of wormholes in sensor networks, in: Proceedings of the ACM workshop on Wireless security (Wise'04), 2004, pp. 51-60.
  • 33
    • 11244273945 scopus 로고    scopus 로고
    • L. Hu, D. Evans, Localization for mobile sensor networks, in: ACM MobiCom'04, 2004, pp. 45-57.
  • 34
    • 27944459744 scopus 로고    scopus 로고
    • D. Liu, P. Ning, W. Du, Detecting malicious beacon nodes for secure location discovery in wireless sensor networks, in: 25th International Conference on Distributed Computer Systems (ICDCS'05), 2005, pp. 609-619.
  • 38
    • 0038341106 scopus 로고    scopus 로고
    • L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security, 2002, pp. 41-47.
  • 41
    • 1542317849 scopus 로고    scopus 로고
    • N. Sastry, U. Shankar, D. Wagner, Secure verification of location claims, in: ACM Workshop on Wireless Security (WiSe'03), 2003, pp. 1-10.
  • 42
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in Sensor Networks: Analysis & Defenses, IPSN'04, 2004, pp. 259-268.
  • 43
    • 37549059363 scopus 로고    scopus 로고
    • Q. Zhang, P. Wang, D.S. Reeves, P. Ning, Defending against Sybil attacks in sensor networks, in: SDCS'05, 2005, pp. 185-191.
  • 44
    • 37549049963 scopus 로고    scopus 로고
    • G. Khanna, S. Bagchi, Y.-S. Wu, Fault tolerant energy aware data dissemination protocol in sensor network, in: IEEE DSN'04, 2004, pp. 739-748.
  • 45
    • 0031357724 scopus 로고    scopus 로고
    • J.H. Kim, J.K. Lee, Performance analysis of Mac protocols for wireless LAN in Rayleigh and shadow fast fading, in: IEEE Global Telecommunications Conference (GLOBECOM), vol. 1, 1997, pp. 404-408.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.