Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting, watch-nodes-based detection and identity-based cryptosystem are used. The simulation results a...

متن کامل

Wormhole Attacks Detection and Prevention Based on 2-Hop Neighbor in Wireless Mesh Networks ⋆

Wireless Mesh Networks (WMNs) are widely used in many areas, such as industrial, commercial and public-safety environments. However, due to the open nature of wireless communication, it is relatively easy for an adversary to launch serious wormhole attack which can’t be even prevented by cryptographic protocols. To enhance the efficiency and facility of wormhole detection, we here propose a hig...

متن کامل

Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distribute...

متن کامل

A survey on wormhole attacks on Wireless Mesh Networks and its detection

Wireless Mesh Networks (WMNs) have come out as an economical and extensible technology that can offer low-cost, high bandwidth, better coverage, etc to meet the needs of lot of people with different properties. But because of its open nature and wireless transmission; it is prone to many attacks of which the wormhole is the severe one. In this attack, the attackers form a tunnel between them; o...

متن کامل

Detecting Wormhole Attacks in Wireless Sensor Networks

Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computational Intelligence Systems

سال: 2012

ISSN: 1875-6891,1875-6883

DOI: 10.1080/18756891.2012.733220