Skip to main content

Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6221))

Abstract

This study proposes an approach to deploy a node implementing IDS (Intrusion Detection System) in MANETs for detecting and isolating wormhole nodes, if they exist. This study uses ns2 to evaluate the proposed IDS nodes, and the results show that these IDSs can rapidly and correctly block the wormhole nodes under the circumstances of low false positives.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khalil, I., et al.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: DSN 2005 (2005)

    Google Scholar 

  2. Naıt-Abdesselam, F., Bensaou, B., Yoo, J.: Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol. In: The Proc. of the IEEE Conference on Wireless Communications and Networking (2007)

    Google Scholar 

  3. Su, M.-Y.: WARP: A Wormhole Avoidance Protocol by Anomaly Detection in Mobile Ad Hoc Networks. Computers & Security 29(2), 208–224 (2010)

    Article  Google Scholar 

  4. Lazos, L., et al.: Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In: WCN 2005 (2005)

    Google Scholar 

  5. Wang, X.: Intrusion Detection Techniques in Wireless Ad Hoc Networks. In: The Proc. of the IEEE International Computer Software and Applications Conference (2006)

    Google Scholar 

  6. Azer, M.A., et al.: Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. In: The Proc. of the IEEE 3rd International Conference on Availability, Reliability and Security (2008)

    Google Scholar 

  7. Gorlatova, M.A., et al.: Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis. In: Proc. of the IEEE Conference on Military Communications (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Su, MY., Chiang, KL. (2010). Prevention of Wormhole Attacks in Mobile Ad Hoc Networks by Intrusion Detection Nodes. In: Pandurangan, G., Anil Kumar, V.S., Ming, G., Liu, Y., Li, Y. (eds) Wireless Algorithms, Systems, and Applications. WASA 2010. Lecture Notes in Computer Science, vol 6221. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14654-1_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14654-1_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14653-4

  • Online ISBN: 978-3-642-14654-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics