TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

Phuong Van Tran, Le Xuan Hung, Young Koo Lee, Sungyoung Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Abstract

Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.

Original languageEnglish
Title of host publication2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
Pages593-598
Number of pages6
DOIs
Publication statusPublished - 2007
Event2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 - Las Vegas, NV, United States
Duration: 2007 Jan 112007 Jan 13

Publication series

Name2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007

Other

Other2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
CountryUnited States
CityLas Vegas, NV
Period07/1/1107/1/13

Keywords

  • AODV
  • Intrusion detection
  • Wireless Ad Hoc Networks
  • Wormhole attacks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks'. Together they form a unique fingerprint.

Cite this