Securing Wireless Network Topology and Routing
نویسندگان
چکیده
Wang, Weichao. Ph.D., Purdue University, August, 2005. Securing Wireless Network Topology and Routing. Major Professor: Bharat Bhargava. This dissertation investigates two research problems to protect wireless network topology and routing: (1) designing protocols with configurable overhead to defend against wormhole attacks; (2) designing an intruder identification mechanism to locate and isolate the malicious nodes in distance vector routing protocols. Previous approaches for wormhole detection in ad hoc networks assume a relationship of trust between direct neighbors and cannot detect wormholes when the attackers are legal members in the network. As a generic approach, an end-to-end mechanism is proposed that assumes trust only between the source and the destination of a route. It integrates the positions of nodes and loosely synchronized clocks to identify fake neighbor connections. An information management scheme is designed to allow a mobile node to predetermine the resources that are consumed on wormhole detection. In our experiments, the computation overhead is less than 0.28% of the CPU time for a ten-hop route. This justifies the feasibility of the proposed mechanism. For wormhole detection in sensor networks, we propose the first group of approaches that do not depend on any special hardware. A normalized variable wormhole indicator is defined based on the distortions in edge length and angles among neighboring sensors. As a centralized approach, MDS-VOW reconstructs the network layout using inaccurate distance measurements among sensors and identifies fake neighbor connections. As a distributed approach, Dis-VoW allows every sensor to detect wormholes locally when the network topology changes. The research creates a new method to solve wireless network security problems by integrating techniques from social science, computer graphics, and scientific visualization.
منابع مشابه
A Hierarchy Topology Design Using a Hybrid Evolutionary Algorithm in Wireless Sensor Networks
Wireless sensor network a powerful network contains many wireless sensors with limited power resource, data processing, and transmission abilities. Wireless sensor capabilities including computational capacity, radio power, and memory capabilities are much limited. Moreover, to design a hierarchy topology, in addition to energy optimization, find an optimum clusters number and best location of ...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملEvolutionary Computing Assisted Wireless Sensor Network Mining for QoS-Centric and Energy-efficient Routing Protocol
The exponential rise in wireless communication demands and allied applications have revitalized academia-industries to develop more efficient routing protocols. Wireless Sensor Network (WSN) being battery operated network, it often undergoes node death-causing pre-ma...
متن کاملIntegrated Network Topological Control and Key Management for Securing Wireless Sensor Networks
Wireless Sensor Networks (WSN) have appeared as one of the important fields at present due to their low-cost, self-organizing behavior, sensing ability in inconsiderate environments, and their huge application extent. One of the most challenging topics in relay network is security. The existing Network Topology Acquisition (NTA) processes for non transparent mode relay networks are not effectiv...
متن کاملAn Efficient Cluster Head Selection Algorithm for Wireless Sensor Networks Using Fuzzy Inference Systems
An efficient cluster head selection algorithm in wireless sensor networks is proposed in this paper. The implementation of the proposed algorithm can improve energy which allows the structured representation of a network topology. According to the residual energy, number of the neighbors, and the centrality of each node, the algorithm uses Fuzzy Inference Systems to select cluster head. The alg...
متن کاملMulticast Routing in Wireless Sensor Networks: A Distributed Reinforcement Learning Approach
Wireless Sensor Networks (WSNs) are consist of independent distributed sensors with storing, processing, sensing and communication capabilities to monitor physical or environmental conditions. There are number of challenges in WSNs because of limitation of battery power, communications, computation and storage space. In the recent years, computational intelligence approaches such as evolutionar...
متن کامل