Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 255))

Abstract

We propose a detection algorithm based on time delay and topology. Node uses RTT to detect its suspicious neighbors and establish its neighbor list. Then, node finds the abnormal network topology with its neighborhood information. If three or more nodes occur, which are mutually non-1-hop neighbors, in the intersection of the two nodes which are 2-hop neighbors, there is wormhole attack. Then, the false neighbors are isolated. The simulation results show that the algorithm has high detection rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, Y.C., Perring, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 370–380 (2006). doi:10.1109/JSAC.2005.861394

    Google Scholar 

  2. Alshamrani, A.S.: PTT: Packet travel time algorithm in mobile ad hoc networks. 2011. 25th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2011), Singapore, Singapore, 22–25 March 2011

    Google Scholar 

  3. Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless ad-hoc networks. 31st Annual International Computer Software and Applications Conference, Beijing, China, 23–27 July 2007

    Google Scholar 

  4. Hayajneh, T., Krishnamurthy, P., Tipper, D.: DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks. 3rd International Conference on Network and System Security, pp. 73–80, 19–21 October 2009

    Google Scholar 

  5. Nait-Abdesselam, F., Bensaou, B., Yoo, J.: Detecting and avoiding wormhole attacks in optimized link state routing protocol. 8th IEEE Wireless Communications and Networking Conference, Kowloon, China, 11–15 March 2007

    Google Scholar 

  6. Nguyen, D., Lamont, L.: A simple and efficient detection of wormhole attacks. New Technologies, Mobility and Security, Tangier, Morocco, 5–7 November 2008

    Google Scholar 

  7. Maheshwari, R., Gao, J., Das, S.: Detecting wormhole attacks in wireless networks using connectivity information. Proceedings of 26th Annual Joint Conference on IEEE Computer and Communication Societies (INFOCOM’07), Anchorage, Alaska, USA, 12 May 2007

    Google Scholar 

  8. Wang, Y., Zhang, Z., Wu, J.: A distributed approach for hidden wormhole detection with neighborhood information. IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau, China, 15–17 July 2010

    Google Scholar 

  9. Shin, S.Y., Halim, E.H.: Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. International Conference on ICT Convergence (ICTC), Jeju Island, South Korea, 15–17 October 2012

    Google Scholar 

Download references

Acknowledgments

The National Natural Science Foundation of China (61151002,60939002); The Fundamental Research Funds for the Central Universities (N110404033).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jun Liu or Xiuping Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Liu, J., Liu, X., Jiang, X., Sha, M. (2014). Wormhole Detection Algorithm Based on RTT and Neighborhood Information. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1759-6_17

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1758-9

  • Online ISBN: 978-81-322-1759-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics