Transmission time-based mechanism to detect wormhole attacks

Tran Van Phuong, Ngo Trong Canh, Young K. Lee, Sungyoung Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Citations (Scopus)

Abstract

Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.

Original languageEnglish
Title of host publicationProceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007
Pages172-178
Number of pages7
DOIs
Publication statusPublished - 2007 Dec 1
Event2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007 - Tsukuba, Japan
Duration: 2007 Dec 112007 Dec 14

Other

Other2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007
CountryJapan
CityTsukuba
Period07/12/1107/12/14

Fingerprint

Wireless ad hoc networks
Hardware

Keywords

  • AODV
  • Intrusion detection
  • Wireless ad hoc networks
  • Wormhole attacks

ASJC Scopus subject areas

  • Computer Science(all)
  • Electrical and Electronic Engineering

Cite this

Van Phuong, T., Canh, N. T., Lee, Y. K., Lee, S., & Lee, H. (2007). Transmission time-based mechanism to detect wormhole attacks. In Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007 (pp. 172-178). [4414457] https://doi.org/10.1109/APSCC.2007.4414457

Transmission time-based mechanism to detect wormhole attacks. / Van Phuong, Tran; Canh, Ngo Trong; Lee, Young K.; Lee, Sungyoung; Lee, Heejo.

Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. 2007. p. 172-178 4414457.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Van Phuong, T, Canh, NT, Lee, YK, Lee, S & Lee, H 2007, Transmission time-based mechanism to detect wormhole attacks. in Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007., 4414457, pp. 172-178, 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, Tsukuba, Japan, 07/12/11. https://doi.org/10.1109/APSCC.2007.4414457
Van Phuong T, Canh NT, Lee YK, Lee S, Lee H. Transmission time-based mechanism to detect wormhole attacks. In Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. 2007. p. 172-178. 4414457 https://doi.org/10.1109/APSCC.2007.4414457
Van Phuong, Tran ; Canh, Ngo Trong ; Lee, Young K. ; Lee, Sungyoung ; Lee, Heejo. / Transmission time-based mechanism to detect wormhole attacks. Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007. 2007. pp. 172-178
@inproceedings{5f5a0265a97047898f8b3a533015a100,
title = "Transmission time-based mechanism to detect wormhole attacks",
abstract = "Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.",
keywords = "AODV, Intrusion detection, Wireless ad hoc networks, Wormhole attacks",
author = "{Van Phuong}, Tran and Canh, {Ngo Trong} and Lee, {Young K.} and Sungyoung Lee and Heejo Lee",
year = "2007",
month = "12",
day = "1",
doi = "10.1109/APSCC.2007.4414457",
language = "English",
isbn = "0769530516",
pages = "172--178",
booktitle = "Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007",

}

TY - GEN

T1 - Transmission time-based mechanism to detect wormhole attacks

AU - Van Phuong, Tran

AU - Canh, Ngo Trong

AU - Lee, Young K.

AU - Lee, Sungyoung

AU - Lee, Heejo

PY - 2007/12/1

Y1 - 2007/12/1

N2 - Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.

AB - Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.

KW - AODV

KW - Intrusion detection

KW - Wireless ad hoc networks

KW - Wormhole attacks

UR - http://www.scopus.com/inward/record.url?scp=47349087906&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=47349087906&partnerID=8YFLogxK

U2 - 10.1109/APSCC.2007.4414457

DO - 10.1109/APSCC.2007.4414457

M3 - Conference contribution

SN - 0769530516

SN - 9780769530512

SP - 172

EP - 178

BT - Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007

ER -