Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
نویسندگان
چکیده
منابع مشابه
Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results a...
متن کاملWormhole Attacks Detection and Prevention Based on 2-Hop Neighbor in Wireless Mesh Networks ⋆
Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...
متن کاملDistributed Detection of Wormhole Attacks in Wireless Sensor Networks
Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distribute...
متن کاملA survey on wormhole attacks on Wireless Mesh Networks and its detection
Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...
متن کاملDetecting Wormhole Attacks in Wireless Sensor Networks
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computational Intelligence Systems
سال: 2012
ISSN: 1875-6891,1875-6883
DOI: 10.1080/18756891.2012.733220