Abstract
We propose a detection algorithm based on time delay and topology. Node uses RTT to detect its suspicious neighbors and establish its neighbor list. Then, node finds the abnormal network topology with its neighborhood information. If three or more nodes occur, which are mutually non-1-hop neighbors, in the intersection of the two nodes which are 2-hop neighbors, there is wormhole attack. Then, the false neighbors are isolated. The simulation results show that the algorithm has high detection rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hu, Y.C., Perring, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2): 370–380 (2006). doi:10.1109/JSAC.2005.861394
Alshamrani, A.S.: PTT: Packet travel time algorithm in mobile ad hoc networks. 2011. 25th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2011), Singapore, Singapore, 22–25 March 2011
Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless ad-hoc networks. 31st Annual International Computer Software and Applications Conference, Beijing, China, 23–27 July 2007
Hayajneh, T., Krishnamurthy, P., Tipper, D.: DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks. 3rd International Conference on Network and System Security, pp. 73–80, 19–21 October 2009
Nait-Abdesselam, F., Bensaou, B., Yoo, J.: Detecting and avoiding wormhole attacks in optimized link state routing protocol. 8th IEEE Wireless Communications and Networking Conference, Kowloon, China, 11–15 March 2007
Nguyen, D., Lamont, L.: A simple and efficient detection of wormhole attacks. New Technologies, Mobility and Security, Tangier, Morocco, 5–7 November 2008
Maheshwari, R., Gao, J., Das, S.: Detecting wormhole attacks in wireless networks using connectivity information. Proceedings of 26th Annual Joint Conference on IEEE Computer and Communication Societies (INFOCOM’07), Anchorage, Alaska, USA, 12 May 2007
Wang, Y., Zhang, Z., Wu, J.: A distributed approach for hidden wormhole detection with neighborhood information. IEEE International Conference on Networking, Architecture, and Storage (NAS 2010), Macau, China, 15–17 July 2010
Shin, S.Y., Halim, E.H.: Wormhole attacks detection in MANETs using routes redundancy and time-based hop calculation. International Conference on ICT Convergence (ICTC), Jeju Island, South Korea, 15–17 October 2012
Acknowledgments
The National Natural Science Foundation of China (61151002,60939002); The Fundamental Research Funds for the Central Universities (N110404033).
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Liu, J., Liu, X., Jiang, X., Sha, M. (2014). Wormhole Detection Algorithm Based on RTT and Neighborhood Information. In: Patnaik, S., Li, X. (eds) Proceedings of International Conference on Computer Science and Information Technology. Advances in Intelligent Systems and Computing, vol 255. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1759-6_17
Download citation
DOI: https://doi.org/10.1007/978-81-322-1759-6_17
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1758-9
Online ISBN: 978-81-322-1759-6
eBook Packages: EngineeringEngineering (R0)