TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

Phuong Van Tran, Le Xuan Hung, Young K. Lee, Sungyoung Lee, Heejo Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Citations (Scopus)

Abstract

Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.

Original languageEnglish
Title of host publication2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
Pages593-598
Number of pages6
DOIs
Publication statusPublished - 2007 Nov 27
Event2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 - Las Vegas, NV, United States
Duration: 2007 Jan 112007 Jan 13

Other

Other2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007
CountryUnited States
CityLas Vegas, NV
Period07/1/1107/1/13

Fingerprint

Wireless ad hoc networks
Routing protocols
Hardware

Keywords

  • AODV
  • Intrusion detection
  • Wireless Ad Hoc Networks
  • Wormhole attacks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Van Tran, P., Hung, L. X., Lee, Y. K., Lee, S., & Lee, H. (2007). TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007 (pp. 593-598). [4199210] https://doi.org/10.1109/CCNC.2007.122

TTM : An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. / Van Tran, Phuong; Hung, Le Xuan; Lee, Young K.; Lee, Sungyoung; Lee, Heejo.

2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. 2007. p. 593-598 4199210.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Van Tran, P, Hung, LX, Lee, YK, Lee, S & Lee, H 2007, TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. in 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007., 4199210, pp. 593-598, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007, Las Vegas, NV, United States, 07/1/11. https://doi.org/10.1109/CCNC.2007.122
Van Tran P, Hung LX, Lee YK, Lee S, Lee H. TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. In 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. 2007. p. 593-598. 4199210 https://doi.org/10.1109/CCNC.2007.122
Van Tran, Phuong ; Hung, Le Xuan ; Lee, Young K. ; Lee, Sungyoung ; Lee, Heejo. / TTM : An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks. 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. 2007. pp. 593-598
@inproceedings{76a8d2b9b31649b98df6cbccdd8303ab,
title = "TTM: An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks",
abstract = "Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.",
keywords = "AODV, Intrusion detection, Wireless Ad Hoc Networks, Wormhole attacks",
author = "{Van Tran}, Phuong and Hung, {Le Xuan} and Lee, {Young K.} and Sungyoung Lee and Heejo Lee",
year = "2007",
month = "11",
day = "27",
doi = "10.1109/CCNC.2007.122",
language = "English",
isbn = "1424406668",
pages = "593--598",
booktitle = "2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007",

}

TY - GEN

T1 - TTM

T2 - An efficient mechanism to detect wormhole attacks in wireless ad-hoc networks

AU - Van Tran, Phuong

AU - Hung, Le Xuan

AU - Lee, Young K.

AU - Lee, Sungyoung

AU - Lee, Heejo

PY - 2007/11/27

Y1 - 2007/11/27

N2 - Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.

AB - Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware required. TTM is designed specifically for Ad Hoc On-Demand Vector Routing Protocol (AODV) but it can be extended to work with other routing protocols.

KW - AODV

KW - Intrusion detection

KW - Wireless Ad Hoc Networks

KW - Wormhole attacks

UR - http://www.scopus.com/inward/record.url?scp=36348954892&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=36348954892&partnerID=8YFLogxK

U2 - 10.1109/CCNC.2007.122

DO - 10.1109/CCNC.2007.122

M3 - Conference contribution

AN - SCOPUS:36348954892

SN - 1424406668

SN - 9781424406661

SP - 593

EP - 598

BT - 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007

ER -