2008
DOI: 10.1007/978-3-540-88582-5_46
|View full text |Cite
|
Sign up to set email alerts
|

WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks

Abstract: Abstract. Wormhole attack is a type of replay attack in wireless networks that has serious consequences and is hard to defend against. This is because the attacker does not need to modify packets or compromise wireless nodes. This paper introduces Wormeros, a new framework to detect wormhole attacks in wireless networks. The framework contains two phases namely suspicion and confirmation. Our solution does not require any special hardware (such as GPS) or expensive mechanisms (such as time synchronization) add… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 7 publications
0
15
0
Order By: Relevance
“…In wormhole attack detection mechanism TTM [10], WORMEROS [11], the fact that the transmission time between two wormhole nodes is much longer than that between two legitimate neighbours which are close together is considered. But, detection based solely on transmission time, can lead to high false positive rate.…”
Section: Time Of Flight Based Approachmentioning
confidence: 99%
“…In wormhole attack detection mechanism TTM [10], WORMEROS [11], the fact that the transmission time between two wormhole nodes is much longer than that between two legitimate neighbours which are close together is considered. But, detection based solely on transmission time, can lead to high false positive rate.…”
Section: Time Of Flight Based Approachmentioning
confidence: 99%
“…Hai vu et al [14] also proposed to detect the presence of wormhole using two phases like in [3] and [5]. The first phase consists of two methods.…”
Section: Detection and Avoidance Of Wormholementioning
confidence: 99%
“…However, most of the techniques have their own limitations like requirements of synchronized clock [2], positioning device, or directional antenna [3], which increase the hardware cost of the system. Some existing solutions use neighbour mismatch method [1], Round Trip Time (RTT) calculation with message encryption using hash function [4], and topological comparison using new packet type [5]. But these solutions have certain limitations like wormholes remaining undetected in sparse network, increased message overhead, and so forth.…”
Section: Introductionmentioning
confidence: 99%
“…(iv) Our proposed method has been compared with the state-of-the-art TRM method [1], WORMEROS [4], and MDS-based local connectivity [7]. Our method can detect all wormhole nodes with fewer false positives.…”
Section: Introductionmentioning
confidence: 99%