Bhushan et al., 2017 - Google Patents
Detection and defense mechanisms against wormhole attacks in wireless sensor networksBhushan et al., 2017
- Document ID
- 13762029052447619812
- Author
- Bhushan B
- Sahoo G
- Publication year
- Publication venue
- 2017 3rd international conference on advances in computing, communication & automation (ICACCA)(fall)
External Links
Snippet
Wireless ad hoc and sensor networks applications are deployed in hostile environments. This leads to emergence of security as a primary requirement. Here, in this paper, a severe attack, wormhole attack is introduced which is challenging to defend. Attackers even without …
- 238000001514 detection method 0 title abstract description 20
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khalil et al. | LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks | |
Roy et al. | A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks | |
Singh et al. | Signal strength based hello flood attack detection and prevention in wireless sensor networks | |
Bhushan et al. | Detection and defense mechanisms against wormhole attacks in wireless sensor networks | |
Qazi et al. | Securing DSR against wormhole attacks in multirate ad hoc networks | |
Safi et al. | A novel approach for avoiding wormhole attacks in VANET | |
Nagrath et al. | Wormhole attacks in wireless adhoc networks and their counter measurements: A survey | |
Biswas et al. | WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol | |
Virmani et al. | Routing attacks in wireless sensor networks: A survey | |
Yun et al. | Wodem: Wormhole attack defense mechanism in wireless sensor networks | |
Kannhavong et al. | Sa-olsr: Security aware optimized link state routing for mobile ad hoc networks | |
Nait-Abdesselam et al. | Detecting and avoiding wormhole attacks in optimized link state routing protocol | |
Agrawal et al. | Performance comparison of AODV and DYMO MANET protocols under wormhole attack environment | |
Tiwari et al. | Collaborative decision for wormhole attack prevention in WSN | |
Dwivedi et al. | An efficient approach for detection of wormhole attack in mobile ad-hoc network | |
Enshaei et al. | A REVIEW ON WORMHOLE ATTACKS IN MANET. | |
Kamatchi et al. | Securing data from black hole attack using aodv routing for mobile ad hoc networks | |
Lee et al. | Wormhole detection method based on location in wireless ad-hoc networks | |
Sanaei et al. | ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW. | |
Garg et al. | Comprehensive study on MANETs network layer attacks | |
Kadhiwala et al. | Exploration of Wormhole Attack with its Detection and Prevention Techniques in Wireless Ad-hoc Networks | |
Khan et al. | An analytical survey of state of the art wormhole detection and prevention techniques | |
Ghanbarzadeh et al. | Wormhole Attack in Wireless Ad hoc Networks | |
Abuhaiba et al. | Securing zone routing protocol in Ad-hoc networks | |
Bhatiya et al. | Detection and prevention of sink hole attack in aodv protocol for wireless sensor network |