메뉴 건너뛰기




Volumn 28, Issue 2, 2011, Pages 89-102

A survey of wormhole-based attacks and their countermeasures in wireless sensor networks

Author keywords

Ad Hoc networks; Intrusion detection; MANET; Security; Sensor node; Wireless sensor networks; Wormhole attacks

Indexed keywords

DATA PACKET; DETECTION PROTOCOLS; FUTURE RESEARCH DIRECTIONS; LOW-LATENCY; MALICIOUS NODES; MANET; NETWORK DATA; RESEARCH AREAS; SECURITY; TWO-POINT; WORMHOLE ATTACK; WORMHOLE ATTACKS;

EID: 79953777183     PISSN: 02564602     EISSN: 09745971     Source Type: Journal    
DOI: 10.4103/0256-4602.78089     Document Type: Article
Times cited : (69)

References (80)
  • 2
    • 33646518088 scopus 로고    scopus 로고
    • Middleware challenges and approaches for wireless sensor networks
    • Mar.
    • S. Hadim and S.N. Mohamed. "Middleware challenges and approaches for wireless sensor networks," IEEE Distributed Systems, vol. 7, no. 3, pp. 1-23, Mar. 2006.
    • (2006) IEEE Distributed Systems , vol.7 , Issue.3 , pp. 1-23
    • Hadim, S.1    Mohamed, S.N.2
  • 6
    • 34548038583 scopus 로고    scopus 로고
    • A survey of key management schemes in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
    • Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. "A Survey of key management schemes in wireless sensor networks," Computer Communications Journal, Special issue on security on wireless ad-hoc and sensor networks, vol. 30, no. 11-12, pp. 2314-41, Sep. 2007. (Pubitemid 47285291)
    • (2007) Computer Communications , vol.30 , Issue.11-12 , pp. 2314-2341
    • Xiao, Y.1    Rayi, V.K.2    Sun, B.3    Du, X.4    Hu, F.5    Galloway, M.6
  • 7
    • 70349968010 scopus 로고    scopus 로고
    • Attacks and countermeasures in multi-hop cognitive radio networks
    • F. Hu, D. Dong, and Y. Xiao. "Attacks and countermeasures in multi-hop cognitive radio networks," International Journal of Security and Networks, vol. 4, no. 4, pp. 263-71, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.4 , pp. 263-271
    • Hu, F.1    Dong, D.2    Xiao, Y.3
  • 8
    • 77949692385 scopus 로고    scopus 로고
    • Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees
    • G.C. Dalton II, K. S. Edge, R. F. Mills, and R.A. Raines. "Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees," International Journal of Security and Networks, vol. 5, no. 2/3, pp. 87-95, 2010.
    • (2010) International Journal of Security and Networks , vol.5 , Issue.2-3 , pp. 87-95
    • Dalton Ii, G.C.1    Edge, K.S.2    Mills, R.F.3    Raines, R.A.4
  • 10
    • 44649095872 scopus 로고    scopus 로고
    • A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks
    • V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris. "A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks," International Journal of Security and Networks, vol. 1, no. 3/4, pp. 255-65, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 255-265
    • Karyotis, V.1    Papavassiliou, S.2    Grammatikou, M.3    Maglaris, V.4
  • 11
    • 84860204995 scopus 로고    scopus 로고
    • Security wireless sensor networks: Problems and solutions," (manuscript in Turkish)
    • Gazi University, Ankara, Turkey,Jan.
    • M. Meghdadi, S. Özdemir, and Ý. Güler. "Security wireless sensor networks: Problems and solutions," (manuscript in Turkish), Journal of HInformatics Technologies, Gazi University, Ankara, Turkey, vol. 1, no. 1, pp. 35-42, Jan. 2008.
    • (2008) Journal of HInformatics Technologies , vol.1 , Issue.1 , pp. 35-42
    • Meghdadi, M.1    Özdemir, S.2    Güler, Ý.3
  • 12
    • 79953770822 scopus 로고    scopus 로고
    • An algorithm for defending blackhole attacks in wireless sensor networks," (manuscript in Turkish)
    • Oct.
    • M. Meghdadi, S. Özdemir, and Ý. Güler. "An algorithm for defending blackhole attacks in wireless sensor networks," (manuscript in Turkish), Proc. of HABTEKUS 08, pp. 71-6, Oct. 2008.
    • (2008) Proc. of HABTEKUS 08 , pp. 71-76
    • Meghdadi, M.1    Özdemir, S.2    Güler, Ý.3
  • 13
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad-hoc networks: Challenges and solution
    • Feb.
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. "Security in mobile ad-hoc networks: Challenges and solution," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, Feb. 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 15
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks
    • Apr.
    • Y.C. Hu, A. Perrig, and D.B. Johnson. "Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks," Proceedings of 22nd IEEE INFOCOM, pp. 1976-86, Apr. 2003.
    • (2003) Proceedings of 22nd IEEE INFOCOM , pp. 1976-1986
    • Hu, Y.C.1    Perrig, A.2    Johnson, D.B.3
  • 16
    • 33845916834 scopus 로고    scopus 로고
    • A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    • DOI 10.1007/s11276-006-3723-x
    • R. Poovendran and L. Lazos. "A graph theoretic framework for preventing the wormhole attack in wireless ad-hoc networks," Wireless Networks, vol. 13, no. 1, pp. 27-59, Jan. 2007. (Pubitemid 46034258)
    • (2007) Wireless Networks , vol.13 , Issue.1 , pp. 27-59
    • Poovendran, R.1    Lazos, L.2
  • 17
    • 24944466187 scopus 로고    scopus 로고
    • Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
    • PHY53-5, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
    • L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L.W. Chang. "Preventing wormhole attacks on wireless ad-hoc networks: A graph theoretic approach," in Preceding of Wireless Communications and Networking Conference, vol. 2, pp. 1193-9, Mar. 2005. (Pubitemid 41311090)
    • (2005) IEEE Wireless Communications and Networking Conference, WCNC , vol.2 , pp. 1193-1199
    • Lazos, L.1    Poovendran, R.2    Meadows, C.3    Syverson, P.4    Chang, L.W.5
  • 18
    • 34548321774 scopus 로고    scopus 로고
    • Detecting wormhole attacks in wireless networks using connectivity information
    • DOI 10.1109/INFCOM.2007.21, 4215603, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • R. Maheshwari, J. Gao, and S.R. Das. "Detecting wormhole attacks in wireless networks using connectivity information," Proceeding of IEEE International Conference on Computer Communication, pp. 107-15, May 2007. (Pubitemid 47334221)
    • (2007) Proceedings - IEEE INFOCOM , pp. 107-115
    • Maheshwari, R.1    Gao, J.2    Das, S.R.3
  • 19
    • 61349151189 scopus 로고    scopus 로고
    • Severity analysis and countermeasure for the wormhole attack in wireless ad-hoc networks
    • Feb.
    • M. Khabbazian, H. Mercier, and V.K. Bhargava. "Severity analysis and countermeasure for the wormhole attack in wireless ad-hoc networks," IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 736-45, Feb. 2009.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.2 , pp. 736-745
    • Khabbazian, M.1    Mercier, H.2    Bhargava, V.K.3
  • 21
    • 61849085156 scopus 로고    scopus 로고
    • An evaluation of connection characteristics for separating network attacks
    • Feb.
    • R. Berthier and M. Cukier. "An evaluation of connection characteristics for separating network attacks," International Journal of Security and Networks, vol. 4, no. 1/2, pp. 110-24, Feb. 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.1-2 , pp. 110-124
    • Berthier, R.1    Cukier, M.2
  • 23
    • 38349154579 scopus 로고    scopus 로고
    • Denial-of-service in wireless sensor networks: Attacks and defenses
    • D.R. Raymond and S.F. Midkiff. "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, vol. 7, no. 1, pp. 74-81, 2008.
    • (2008) IEEE Pervasive Computing , vol.7 , Issue.1 , pp. 74-81
    • Raymond, D.R.1    Midkiff, S.F.2
  • 24
    • 0036793924 scopus 로고    scopus 로고
    • Denial-of-service in sensor networks
    • Oct.
    • A.D. Wood and J.A. Stankovic. "Denial-of-service in sensor networks," IEEE Computer Society Press, vol. 35, no. 10, pp 54-62, Oct. 2002.
    • (2002) IEEE Computer Society Press , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 26
    • 79951648076 scopus 로고    scopus 로고
    • LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad-hoc network
    • H.Y. Hsu, S. Zhu, and A.R. Hurson. "LIP: A lightweight interlayer protocol for preventing packet injection attacks in mobile ad-hoc network," International Journal of Security and Networks, vol. 2, no. 3/4, pp. 202-15, 2007.
    • (2007) International Journal of Security and Networks , vol.2 , Issue.3-4 , pp. 202-215
    • Hsu, H.Y.1    Zhu, S.2    Hurson, A.R.3
  • 27
    • 68149180871 scopus 로고    scopus 로고
    • Intrusion detection system for denial-of-service flooding attacks in SIP communication networks
    • S. Ehlert, Y. Rebahi, and T. Magedanz. "Intrusion detection system for denial-of-service flooding attacks in SIP communication networks," International Journal of Security and Networks, vol. 4, no. 3, pp. 189-200, 2009.
    • (2009) International Journal of Security and Networks , vol.4 , Issue.3 , pp. 189-200
    • Ehlert, S.1    Rebahi, Y.2    Magedanz, T.3
  • 28
    • 84890880165 scopus 로고    scopus 로고
    • Limiting DoS attacks during multi-hop data delivery in wireless sensor networks
    • J. Deng, R. Han, and S. Mishra. "Limiting DoS attacks during multi-hop data delivery in wireless sensor networks," International Journal of Security and Networks, vol. 1, no. 3/4, pp. 167-78, 2006.
    • (2006) International Journal of Security and Networks , vol.1 , Issue.3-4 , pp. 167-178
    • Deng, J.1    Han, R.2    Mishra, S.3
  • 29
    • 33750397274 scopus 로고    scopus 로고
    • DePHI: Wormhole detection mechanism for ad hoc wireless networks
    • 2006 1st International Symposium on Wireless Pervasive Computing
    • H.S. Chiu and K.S. Lui. "DelPHI: Wormhole detection mechanism for ad-hoc wireless networks," 1st International Symposium on Wireless Pervasive Computing, 6 pp. 1-6, Jan. 2006. (Pubitemid 44643077)
    • (2006) 2006 1st International Symposium on Wireless Pervasive Computing , vol.2006 , pp. 1-6
    • Chiu, H.S.1    Lui, K.-S.2
  • 33
    • 58149526685 scopus 로고    scopus 로고
    • Defending mechanisms against sybil attack in next generation mobile adhoc networks
    • Jul-Aug.
    • S. Pal, A.K. Mukhopadhyay, and P.P. Bhattacharya. "Defending mechanisms against sybil attack in next generation mobile adhoc networks," ITEE Technical Review Journal, vol. 25, no. 4, pp. 209-14, Jul-Aug. 2008.
    • (2008) ITEE Technical Review Journal , vol.25 , Issue.4 , pp. 209-214
    • Pal, S.1    Mukhopadhyay, A.K.2    Bhattacharya, P.P.3
  • 36
    • 34547650617 scopus 로고    scopus 로고
    • The invisible node attack revisited
    • DOI 10.1109/SECON.2007.342988, 4147518, 2007 IEEE SoutheastCon
    • T.R. Andel and A. Yasinsac. "The invisible node attack revisited," proceeding of IEEE, pp. 686-91, Mar. 2007. (Pubitemid 47208387)
    • (2007) Conference Proceedings - IEEE SOUTHEASTCON , pp. 686-691
    • Andel, T.R.1    Yasinsac, A.2
  • 37
    • 58149526685 scopus 로고    scopus 로고
    • Defending mechanisms against sybil attack in next generation mobile ad-hoc networks
    • Jul- Aug.
    • S. Pal, A.K. Mukhopadhyay, and P.P. Bhattacharya. "Defending mechanisms against sybil attack in next generation mobile ad-hoc networks," IETE Technical Review, vol 25, no 4, pp. 209-14, Jul- Aug. 2008.
    • (2008) IETE Technical Review , vol.25 , Issue.4 , pp. 209-214
    • Pal, S.1    Mukhopadhyay, A.K.2    Bhattacharya, P.P.3
  • 39
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad-hoc routing
    • May
    • Y.C. Hu and A. Perrig. "A survey of secure wireless ad-hoc routing," Security and Privacy Magazine, IEEE, vol. 2, no 3, pp. 28-39, May 2004.
    • (2004) Security and Privacy Magazine, IEEE , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.C.1    Perrig, A.2
  • 43
    • 84943681390 scopus 로고
    • A survey of wormhole routing techniques in direct networks
    • Feb.
    • L.M. Ni and P.K. McKinley. "A survey of wormhole routing techniques in direct networks," IEEE Computer, vol. 26, no. 2, pp. 62-76, Feb. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.2 , pp. 62-76
    • Ni, L.M.1    McKinley, P.K.2
  • 44
    • 0041663475 scopus 로고    scopus 로고
    • Opportunistic large arrays: Cooperative transmission in wireless multi-hop ad-hoc networks to reach far distances
    • Aug.
    • A. Scaglione and Y.W. Hong. "Opportunistic large arrays: Cooperative transmission in wireless multi-hop ad-hoc networks to reach far distances," IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2082-92, Aug. 2003.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.8 , pp. 2082-2092
    • Scaglione, A.1    Hong, Y.W.2
  • 48
    • 24744448664 scopus 로고    scopus 로고
    • Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks
    • Proceedings ITCC 2005 - International Conference on Information Technology: Coding and Computing
    • T. Korkmaz. "Verifying physical presence of neighbors against replay-based attacks in wireless ad-hoc networks," International Conference On Information Technology: Coding and Computing 2005(ITCC 2005), pp. 704-9, 2005. (Pubitemid 41290309)
    • (2005) International Conference on Information Technology: Coding and Computing, ITCC , vol.2 , pp. 704-709
    • Korkmaz, T.1
  • 49
    • 1542317831 scopus 로고    scopus 로고
    • Rushing attacks and defense in wireless ad-hoc network routing protocols
    • Y.C. Hu, A. Perring, and D. Johnson. "Rushing attacks and defense in wireless ad-hoc network routing protocols," ACM Workshop on Wireless Security, pp. 30-40, 2003.
    • (2003) ACM Workshop on Wireless Security , pp. 30-40
    • Hu, Y.C.1    Perring, A.2    Johnson, D.3
  • 55
    • 1542356506 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad-hoc networks
    • D.B. Johnson, D.A. Maltz, and Y. Hu. "The dynamic source routing protocol for mobile ad-hoc networks," IETF MANET, Internet Draft. Available from: http://www.cs.cmu.edu/~dmaltz/internetdrafts/ draft-ietf-manet-dsr-09.txt [last cited in 2003].
    • (2003) IETF MANET, Internet Draft
    • Johnson, D.B.1    Maltz, D.A.2    Hu, Y.3
  • 63
    • 0142187757 scopus 로고    scopus 로고
    • Preventing replay attacks for secure routing in ad-hoc networks
    • J. Zhen and S. Srinivas. "Preventing replay attacks for secure routing in ad-hoc networks," Proc. of 2nd Ad Hoc Networks and Wireless, pp. 140-50, 2003.
    • (2003) Proc. of 2nd Ad Hoc Networks and Wireless , pp. 140-150
    • Zhen, J.1    Srinivas, S.2
  • 64
  • 69
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe
    • L. Lazos and R. Poovendran, "Serloc: Secure range-independent localization for wireless sensor networks," Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, Oct. 2004. (Pubitemid 40062792)
    • (2004) Proceedings of the 2004 ACM Workshop on Wireless Security, WiSe , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 71
    • 37549006809 scopus 로고    scopus 로고
    • MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks
    • I. Khalil, S. Bagchi, and N.B. Shroff. "MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks," Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344-62, 2008.
    • (2008) Elsevier Ad Hoc Networks , vol.6 , Issue.3 , pp. 344-362
    • Khalil, I.1    Bagchi, S.2    Shroff, N.B.3
  • 73
    • 58049188696 scopus 로고    scopus 로고
    • Secure neighbor discovery in wireless networks: Formal investigation of possibility
    • M. Poturalski, P. Papadimitratos, and J.P. Hubaux. "Secure neighbor discovery in wireless networks: Formal investigation of possibility," ACM ASIACCS2008, pp. 189-200, 2008.
    • (2008) ACM ASIACCS2008 , pp. 189-200
    • Poturalski, M.1    Papadimitratos, P.2    Hubaux, J.P.3
  • 75
  • 79
    • 16644374371 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • DOI 10.1145/1053283.1053287
    • D. Liu, P. Ning, and R. Li. "Establishing pair-wise keys in distributed sensor networks," ACM Transactions on Information and System Security, vol. 8, no.1, pp. 41-77, 2005. (Pubitemid 40479429)
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.1 , pp. 41-77
    • Liu, D.1    Ning, P.2    Rongfang, L.I.3
  • 80
    • 54949103489 scopus 로고    scopus 로고
    • Functional reputation based reliable data aggregation and transmission for wireless sensor networks
    • Elsevier
    • S. Ozdemir, "Functional reputation based reliable data aggregation and transmission for wireless sensor networks," Computer Communications, Elsevier, vol. 31, no. 17, pp. 3941-53, 2008.
    • (2008) Computer Communications , vol.31 , Issue.17 , pp. 3941-3953
    • Ozdemir, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.