2012 8th International Conference on Wireless Communications, Networking and Mobile Computing 2012
DOI: 10.1109/wicom.2012.6478576
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Wormhole Attack in Underwater Sensor Network

Abstract: In underwater sensor network, security becomes a primary concern in order to provide protected communication. In this paper, we present a novel network simulation component, wormhole attack, in NS2 , for underwater sensor networks, after analyzing the current methods of simulating wormhole attack. The core idea of wormhole implementation is making a "tunnel" between two malicious nodes. If this "tunnel" is built on normal wireless or wired channel,there would be some unexpected channel loss. So in order to sol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A large percentage of the primary studies are focused on addressing a particular threat or group of attacks, proposing new algorithms 17,37,46 and security models. 30,44,49 The other papers are focused on demonstration and classification of attacks and threats, such as DoS, localization and routing attacks, 26,27,32 as well as presenting security issues and key research challenges. 13,16,23 These studies are mostly evaluated using simulations.…”
Section: Discussionmentioning
confidence: 99%
“…26,29 • Wormhole: In a wormhole attack, an attacker uses two malicious nodes to tunnel traffic through the network. 14,27,32 The two colluding nodes capture packets and transmit them to the destinations using an external communication channel or the existing network infrastructure, leading to the creation of false neighbor connections and an illusion of a shortcut route to increase their probability of being selected in routing. 27,32 The wormhole can be used to perform DoS by selectively dropping packets, traffic analysis, or to enable further attacks.…”
Section: Security Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Wormhole attack detection and countermeasures have attracted many research studies. In [ 46 ], a wormhole attack was simulated in NS 2. The work selected the existing wired object link in the NS 2 wired simulation package to simulate the “tunnel” by copying the local packets and directly sending them to the wormhole object installed in a remote node.…”
Section: Threats and Challenges In Underwater Wireless Sensor Netwmentioning
confidence: 99%