[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bhushan et al., 2017 - Google Patents

Detection and defense mechanisms against wormhole attacks in wireless sensor networks

Bhushan et al., 2017

Document ID
13762029052447619812
Author
Bhushan B
Sahoo G
Publication year
Publication venue
2017 3rd international conference on advances in computing, communication & automation (ICACCA)(fall)

External Links

Snippet

Wireless ad hoc and sensor networks applications are deployed in hostile environments. This leads to emergence of security as a primary requirement. Here, in this paper, a severe attack, wormhole attack is introduced which is challenging to defend. Attackers even without …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field

Similar Documents

Publication Publication Date Title
Khalil et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks
Roy et al. A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks
Singh et al. Signal strength based hello flood attack detection and prevention in wireless sensor networks
Bhushan et al. Detection and defense mechanisms against wormhole attacks in wireless sensor networks
Qazi et al. Securing DSR against wormhole attacks in multirate ad hoc networks
Safi et al. A novel approach for avoiding wormhole attacks in VANET
Nagrath et al. Wormhole attacks in wireless adhoc networks and their counter measurements: A survey
Biswas et al. WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol
Virmani et al. Routing attacks in wireless sensor networks: A survey
Yun et al. Wodem: Wormhole attack defense mechanism in wireless sensor networks
Kannhavong et al. Sa-olsr: Security aware optimized link state routing for mobile ad hoc networks
Nait-Abdesselam et al. Detecting and avoiding wormhole attacks in optimized link state routing protocol
Agrawal et al. Performance comparison of AODV and DYMO MANET protocols under wormhole attack environment
Tiwari et al. Collaborative decision for wormhole attack prevention in WSN
Dwivedi et al. An efficient approach for detection of wormhole attack in mobile ad-hoc network
Enshaei et al. A REVIEW ON WORMHOLE ATTACKS IN MANET.
Kamatchi et al. Securing data from black hole attack using aodv routing for mobile ad hoc networks
Lee et al. Wormhole detection method based on location in wireless ad-hoc networks
Sanaei et al. ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW.
Garg et al. Comprehensive study on MANETs network layer attacks
Kadhiwala et al. Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks
Khan et al. An analytical survey of state of the art wormhole detection and prevention techniques
Ghanbarzadeh et al. Wormhole Attack in Wireless Ad hoc Networks
Abuhaiba et al. Securing zone routing protocol in Ad-hoc networks
Bhatiya et al. Detection and prevention of sink hole attack in aodv protocol for wireless sensor network