Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks

@inproceedings{Dimitriou2010WormholesNM,
  title={Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks},
  author={Tassos Dimitriou and Thanassis Giannetsos},
  booktitle={DCOSS},
  year={2010}
}
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination… CONTINUE READING
Highly Cited
This paper has 18 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 13 extracted citations

Prevention of Wormhole Attacks in Wireless Sensor Networks

2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation • 2014
View 3 Excerpts
Highly Influenced

Monitoring of Wireless Sensor Networks: Analysis of Intrusion Detection Systems

2018 5th International Conference on Control, Decision and Information Technologies (CoDIT) • 2018
View 1 Excerpt

On providing wormhole-attack-resistant localization using conflicting sets

Wireless Communications and Mobile Computing • 2015
View 1 Excerpt

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information

IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications • 2007
View 6 Excerpts
Highly Influenced

Detecting Selective Forwarding Attacks in Wireless Sensor Networks Using Two-hops Neighbor Knowledge

2008 Seventh IEEE International Symposium on Network Computing and Applications • 2008
View 1 Excerpt

Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side

2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications • 2008

a-Coverage Scheme for Wireless Sensor Networks

2008 The Fourth International Conference on Wireless and Mobile Communications • 2008
View 1 Excerpt

Hubaux . Sector : secure tracking of node encounters in multihop wireless networks

L. Buttyan S. S. Capkun, J.-P.
Wireless Networks , V • 2007

Interactive wormhole detection and evaluation

Information Visualization • 2007
View 1 Excerpt

Similar Papers

Loading similar papers…