2013
DOI: 10.1186/1687-1499-2013-180
|View full text |Cite
|
Sign up to set email alerts
|

WRSR: wormhole-resistant secure routing for wireless mesh networks

Abstract: Wormhole attack is one of the most severe security threats in wireless mesh network that can disrupt majority of routing communications, when strategically placed. At the same time, most of the existing wormhole defence mechanisms are not secure against wormhole attacks that are launched in participation mode. In this paper, we propose WRSR, a wormhole-resistant secure routing algorithm that detects the presence of wormhole during route discovery process and quarantines it. Unlike other existing schemes that i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 22 publications
(15 citation statements)
references
References 26 publications
0
15
0
Order By: Relevance
“…It facilitates nodes to monitor their two-hop subpaths and selects only such routes that are verified to be wormhole-free. It relies on the observations made in [36] to distinguish out-of-band links from real links. It relies on the fact that, in a uniformly distributed network, alternate routes within a maximum of 4-hops exist between node separated by a distance of 2R, where is the transmission range of a node.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…It facilitates nodes to monitor their two-hop subpaths and selects only such routes that are verified to be wormhole-free. It relies on the observations made in [36] to distinguish out-of-band links from real links. It relies on the fact that, in a uniformly distributed network, alternate routes within a maximum of 4-hops exist between node separated by a distance of 2R, where is the transmission range of a node.…”
Section: Discussionmentioning
confidence: 99%
“…But it has been already proven that finding such an alternate path is negligible in [36]. Therefore, the only way to accept such an incorrect routing entry is by fabricating an alternate Join Request traversing a nonexisting alternate subpath.…”
Section: Casementioning
confidence: 99%
See 3 more Smart Citations