메뉴 건너뛰기




Volumn , Issue , 2009, Pages 73-80

DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DETECTION PROTOCOLS; FALSE POSITIVE RATES; HIGH DETECTION RATE; LOW OVERHEAD; MULTIHOP AD HOC; PHYSICAL LAYERS; ROUTING INFORMATION; SECURITY ATTACKS; SIMPLE PROTOCOL; SIMULATION-BASED ANALYSIS; SPECIAL HARDWARE; WORMHOLE ATTACK;

EID: 72849152308     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.85     Document Type: Conference Paper
Times cited : (46)

References (26)
  • 1
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in Proc. of IEEE INFOCOM, 2003.
    • (2003) Proc. of IEEE INFOCOM
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 4
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. of NDSS, 2004.
    • (2004) Proc. of NDSS
    • Hu, L.1    Evans, D.2
  • 7
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using connectivity information
    • R. Maheshwari, J. Gao, and S. R. Das, "Detecting wormhole attacks in wireless networks using connectivity information," in Proc. of IEEE INFOCOM, 2007.
    • (2007) Proc. of IEEE INFOCOM
    • Maheshwari, R.1    Gao, J.2    Das, S.R.3
  • 8
    • 47349107481 scopus 로고    scopus 로고
    • Distributed detection of worm-holes and critical links in wireless sensor networks
    • Y.-T. Hou, C.-M. Chen, and B. Jeng, "Distributed detection of worm-holes and critical links in wireless sensor networks," in Proc. of IIHMSP, 2007.
    • (2007) Proc. of IIHMSP
    • Hou, Y.-T.1    Chen, C.-M.2    Jeng, B.3
  • 10
    • 46149096001 scopus 로고    scopus 로고
    • Truelink: A practical countermeasure to the wormhole attack in wireless networks
    • J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," in Proc. of IEEE ICNP, 2006.
    • (2006) Proc. of IEEE ICNP
    • Eriksson, J.1    Krishnamurthy, S.V.2    Faloutsos, M.3
  • 11
    • 33745403778 scopus 로고    scopus 로고
    • Defending against wormhole attacks in mobile ad hoc networks: Research articles
    • W. Wang, B. Bhargava, Y. Lu, and X. Wu, "Defending against wormhole attacks in mobile ad hoc networks: Research articles," Wirel. Commun. Mob. Comput., vol. 6, no. 4, pp. 483-503, 2006.
    • (2006) Wirel. Commun. Mob. Comput , vol.6 , Issue.4 , pp. 483-503
    • Wang, W.1    Bhargava, B.2    Lu, Y.3    Wu, X.4
  • 12
    • 38549151872 scopus 로고    scopus 로고
    • On mitigating in-band wormhole attacks in mobile ad hoc networks
    • X. Su and R. V. Boppana, "On mitigating in-band wormhole attacks in mobile ad hoc networks," in Proc. of IEEE ICC, 2007.
    • (2007) Proc. of IEEE , vol.199
    • Su, X.1    Boppana, R.V.2
  • 14
    • 34447283779 scopus 로고    scopus 로고
    • Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks
    • I. Khalil, S. Bagchi, and N. B. Shroff, "Liteworp: Detection and isolation of the wormhole attack in static multihop wireless networks," Comput. Netw., vol. 51, no. 13, pp. 3750-3772, 2007.
    • (2007) Comput. Netw , vol.51 , Issue.13 , pp. 3750-3772
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 15
    • 37549006809 scopus 로고    scopus 로고
    • Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks
    • -, "Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks," Ad Hoc Netw., vol. 6, no. 3, pp. 344-362, 2008.
    • (2008) Ad Hoc Netw , vol.6 , Issue.3 , pp. 344-362
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 17
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • R. Poovendran and L. Lazos, "A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wirel. Netw., vol. 13, no. 1, pp. 27-59, 2007.
    • (2007) Wirel. Netw , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 18
    • 33750599100 scopus 로고    scopus 로고
    • Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
    • L. Qian, N. Song, and X. Li, "Detection of wormhole attacks in multi-path routed wireless ad hoc networks: a statistical analysis approach," J. Netw. Comput. Appl., vol. 30, no. 1, pp. 308-330, 2007.
    • (2007) J. Netw. Comput. Appl , vol.30 , Issue.1 , pp. 308-330
    • Qian, L.1    Song, N.2    Li, X.3
  • 19
    • 84883856631 scopus 로고    scopus 로고
    • Partitioning avoidance in mobile ad hoc networks using network survivability concepts
    • D. Goyal and J. J. Caffery, "Partitioning avoidance in mobile ad hoc networks using network survivability concepts," in Proc. of IEEE ISCC, 2002.
    • (2002) Proc. of IEEE ISCC
    • Goyal, D.1    Caffery, J.J.2
  • 20
    • 72849145889 scopus 로고    scopus 로고
    • Adaptation of the breadth first search algorithm for cut-edge detection in wireless multihop networks
    • B. Milic and M. Malek, "Adaptation of the breadth first search algorithm for cut-edge detection in wireless multihop networks," in Proc. of. ACM MSWiM, 2007.
    • (2007) Proc. of. ACM MSWiM
    • Milic, B.1    Malek, M.2
  • 21
    • 33746631403 scopus 로고    scopus 로고
    • Effectiveness of reliable routing protocols in mobile ad hoc networks
    • K.-I. Kim and S.-H. Kim, "Effectiveness of reliable routing protocols in mobile ad hoc networks," Wirel. Pers. Commun., vol. 38, no. 3, pp. 377-390, 2006.
    • (2006) Wirel. Pers. Commun , vol.38 , Issue.3 , pp. 377-390
    • Kim, K.-I.1    Kim, S.-H.2
  • 22
    • 7744227596 scopus 로고    scopus 로고
    • A review of routing protocols for mobile ad hoc networks
    • M. Abolhasan, T. Wysocki, and E. Dutkiewicz, "A review of routing protocols for mobile ad hoc networks," Ad Hoc Networks, vol. 2, no. 1, pp. 1-22, 2004.
    • (2004) Ad Hoc Networks , vol.2 , Issue.1 , pp. 1-22
    • Abolhasan, M.1    Wysocki, T.2    Dutkiewicz, E.3
  • 23
    • 50949096791 scopus 로고    scopus 로고
    • Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure
    • M. Khabbazian, H. Mercier, and V. K. Bhargava, "Nis02-1: Wormhole attack in wireless ad hoc networks: Analysis and countermeasure," in Proc. of IEEE GLOBECOM, 2006.
    • (2006) Proc. of IEEE GLOBECOM
    • Khabbazian, M.1    Mercier, H.2    Bhargava, V.K.3
  • 26
    • 34247575139 scopus 로고    scopus 로고
    • Handling asymmetry in power heterogeneous ad hoc networks
    • V. Shah, E. Gelal, and S. V. Krishnamurthy, "Handling asymmetry in power heterogeneous ad hoc networks," Comput. Netw., vol. 51, no. 10, pp. 2594-2615, 2007.
    • (2007) Comput. Netw , vol.51 , Issue.10 , pp. 2594-2615
    • Shah, V.1    Gelal, E.2    Krishnamurthy, S.V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.