2010 IEEE Fifth International Conference on Networking, Architecture, and Storage 2010
DOI: 10.1109/nas.2010.22
|View full text |Cite
|
Sign up to set email alerts
|

A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…(1) Search on ordinary node abnormal topology Yun Wang et al [9] presented that the normal network had normal topology. In normal networks, the two-hop neighbors had only up to two common one hop neighbors.…”
Section: Abnormal Topology Searchesmentioning
confidence: 99%
“…(1) Search on ordinary node abnormal topology Yun Wang et al [9] presented that the normal network had normal topology. In normal networks, the two-hop neighbors had only up to two common one hop neighbors.…”
Section: Abnormal Topology Searchesmentioning
confidence: 99%
“…UDGs have been extensively employed to create an idealized communication model for a multi-hop wireless network [14,20,25]. In UDGs, each node can be modelled as a disk of unit radius in a plane.…”
Section: Unit Disk Graphmentioning
confidence: 99%
“…The other unique characteristic of a wormhole link is that it abnormally increases the node's neighbourhood, and this feature is being exploited in [8,[14][15][16] to detect hidden wormhole. Let W 1 be a wormhole node that shares an out-of-band channel with another wormhole node W 2 .…”
Section: Introductionmentioning
confidence: 99%
“…Based on this information, each node finds the locations of some affected regions caused by wormholes and stop forwarding packets which came from those regions to isolate the wormhole (Nasipuri et al, 2001;Pirzada and McDonald, 2004). The distribution wormhole detection algorithm can be further classified into two approaches, namely, non-routing neighboring monitoring based approach (Huang and Lee, 2003) where each node monitors the topology structure of its neighbors (Wang et al, 2010;Maheshwari et al, 2007), or the inputs and outputs data flows (Khalil et al, 2005;2008) and routing receiver monitoring based approach where a data packet is monitored by the nodes in its routine. The typical distributed approaches are packet leashes (Hu et al, 2003;, TESLA with Instant Key-disclosure (Perrig et al, 2000) and mutual authentication with distancebounding (Liu et al, 2005;Du et al, 2006).…”
Section: Jcsmentioning
confidence: 99%
“…Figure 3 depicts the wormholes detection and isolation process. Wang et al (2010) proposed a similar wormhole detection and isolation approach. The proposed approach is mainly based on the following corollary: If there exist three mutually non-one-hop neighbor nodes in the intersection area of the two-hop neighbor sets of the nodes p and q, then p and q are certainly affected by a wormhole.…”
Section: Distributed Wormhole Detectionmentioning
confidence: 99%