Academic literature on the topic 'Wormhole Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wormhole Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wormhole Attack"

1

Safitri, Nini Kurnia, Andy Hidayat Jatmika, and Moh Ali Albar. "Deteksi dan Pencegahan Serangan Wormhole pada Protokol Routing AOMDV menggunakan Gabungan Metode Delphi dan RTT-TC pada Jaringan MANET." Journal of Computer Science and Informatics Engineering (J-Cosine) 3, no. 1 (June 29, 2019): 49–55. http://dx.doi.org/10.29303/jcosine.v3i1.242.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a network consisting of a group of mobile nodes that don't have a fixed infrastructure. This causes the MANET to be vulnerable to attacks that can interfere with the process of communication and data transmission on the network. One type of attack that can attack the MANET is a wormhole attack. The wormhole is an attack on a network where there are two or more wormhole nodes that are interconnected and work together to attack network traffic or discard data packets it receives. Each wormhole node will be connected to each other using a wormhole link. To prevent wormhole attacks, the method that can be used is the Delay Per Hop Indicator (Delphi) method and the Round Trip Time and Topological Comparison (RTT-TC) method. The Delphi detects wormhole attacks by calculating the delay in each hop from the source node to the destination node. Whereas in the RTT-TC, wormhole attacks are detected by calculating the value of round trip time and topological comparison. The Delphi and RTT-TC methods have their advantages and disadvantages. In this study, it was proposed to combine the Delphi and RTT-TC methods to cover the disadvantage of each method.
APA, Harvard, Vancouver, ISO, and other styles
2

Mukherjee, Saswati, Matangini Chattopadhyay, Samiran Chattopadhyay, and Pragma Kar. "Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network." Journal of Computer Networks and Communications 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/3405264.

Full text
Abstract:
In wireless communication, wormhole attack is a crucial threat that deteriorates the normal functionality of the network. Invasion of wormholes destroys the network topology completely. However, most of the existing solutions require special hardware or synchronized clock or long processing time to defend against long path wormhole attacks. In this work, we propose a wormhole detection method using range-based topology comparison that exploits the local neighbourhood subgraph. The Round Trip Time (RTT) for each node pair is gathered to generate neighbour information. Then, the network is reconstructed by ordinal Multidimensional Scaling (MDS) followed by a suspicion phase that enlists the suspected wormholes based on the spatial reconstruction. Iterative computation of MDS helps to visualize the topology changes and can localize the potential wormholes. Finally, a verification phase is used to remove falsely accused nodes and identify real adversaries. The novelty of our algorithm is that it can detect both short path and long path wormhole links. Extensive simulations are executed to demonstrate the efficacy of our approach compared to existing ones.
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Guowei, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. "An efficient wormhole attack detection method in wireless sensor networks." Computer Science and Information Systems 11, no. 3 (2014): 1127–41. http://dx.doi.org/10.2298/csis130921068w.

Full text
Abstract:
Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.
APA, Harvard, Vancouver, ISO, and other styles
4

Luan, Liang Yu, Ying Fang Fu, Peng Xiao, and Ling Xi Peng. "Preventing Wormhole Attacks in Wireless Mesh Networks." Applied Mechanics and Materials 443 (October 2013): 440–45. http://dx.doi.org/10.4028/www.scientific.net/amm.443.440.

Full text
Abstract:
In a wireless mesh network, the need for cooperation among wireless nodes to relay each others packets exposes the network to a wide range of security threats. A particularly devastating type of threats is the so-called wormhole attacks. In order to defense against the attack, a type of wormhole attack model and a watch nodes-based wormhole attack detection scheme were presented in this paper. The scheme that is based on the combination of a number of techniques, such as distributed voting, watch nodes based detection and identity-based cryptosystem. Qualitative analysis and simulation show that the wormhole attack detection scheme is more advantageous over the some of the previous schemes in terms of performance and cost.
APA, Harvard, Vancouver, ISO, and other styles
5

K*, Parvathy. "Wormhole Attacks in Wireless Sensor Networks (Wsn) & Internet of Things (IoT): A Review." International Journal of Recent Technology and Engineering 10, no. 1 (May 30, 2021): 199–203. http://dx.doi.org/10.35940/ijrte.a5873.0510121.

Full text
Abstract:
In the current world people are using the sensing networks called IoT and WSN as the subset of IoT in various applications. The employment of these sensor networks is rapidly increasing. Due to the longer usage of these sensor networks security issues are eventually happening and has the possibility of developing the attacks in the network. In this review, focuses on wormhole attacks in wireless sensor network (WSN) and Internet of Things (IoT) creating a tunnels i.e., wormhole link in between source and the destination node in the network. The classification of wormhole attack in both WSN and IoT are presented based on the mode of attacker. The detection mechanisms of wormhole attack are specified in both WSN and IoT. It hypothesizes the detection strength is more in IoT than the WSN based on the analysis, the parameters of the detection algorithm that the WSN is about 20% while in IoT is 70%.
APA, Harvard, Vancouver, ISO, and other styles
6

Neerugatti, Vikram, and A. Rama Mohan Reddy. "Acknowledgement Based Technique for Detection of the Wormhole Attack in RPL Based Internet of Things Networks." Asian Journal of Computer Science and Technology 8, S3 (June 5, 2019): 100–104. http://dx.doi.org/10.51983/ajcst-2019.8.s3.2075.

Full text
Abstract:
Internet of Things (IoT) is the advanced technology, were the constrained nodes/things (all the objects around us such as chair, home, car, keys, etc.) will be connected to the internet to form a network, for sharing and monitoring the data, remotely. RPL (IPv6 Routing Protocol for Low Power and Lossy networks) is a routing protocol particularly designed for the constrained (low powered, low computation, less size, etc.) networks with the protocol 6LoWPAN (IPv6 Low Powered wireless Personal Area Networks). Due to the constrained behaviour of the RPL protocol, it will leads to many RPL routing attacks such as Sinkhole, Black hole, Wormhole, Selective forwarding, rank attacks, etc. This paper was focused on the Wormhole attack. The Wormhole attack will select the packets from one location and drops those packets in some other location (malicious) by forming the Tunnelling. To detect this attack here proposed and implemented a novel approach called (ADWA). Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks. This approach was shown efficient results with the Telosb sky emulator nodes in the Contiki Cooja simulator, in terms of the Packet delivery ratio, delay and detection of wormhole attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Singh, Rupinder, Jatinder Singh, and Ravinder Singh. "WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/8354930.

Full text
Abstract:
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
APA, Harvard, Vancouver, ISO, and other styles
8

Peda Gopi, A., E. Suresh Babu, C. Naga Raju, and S. Ashok Kumar. "Designing an Adversarial Model Against Reactive and Proactive Routing Protocols in MANETS: A Comparative Performance Study." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 5 (October 1, 2015): 1111. http://dx.doi.org/10.11591/ijece.v5i5.pp1111-1118.

Full text
Abstract:
Mobile ad-hoc networks are self-organized infrastructure less networks that consists of mobile nodes, which are capable of maintaining and forming the network by themselves. Recently, researchers are designed several routing protocols on these networks. However, these routing protocols are more vulnerable to attacks from the intruders, which can easily paralyze the operation of the network due to its inherited characteristics of MANETS. One such type of attack is wormhole attack. Because of its severity, the wormhole attack has attracted a great deal of attention in the research community. This paper compares reactive and proactive routing protocols in adversarial environment. Specifically, wormhole attack is applied to these routing protocols to evaluate its performance through simulation. Comprehensively the results shows the comparative performance of these protocols against wormhole attack is hard to detect and easy to implement.
APA, Harvard, Vancouver, ISO, and other styles
9

Divekar, Anuja Sanjay, Deepali Borade, and Vivek Bugad. "A Simple and Efficient Mechanism to Detect and Avoid Wormhole Attacks in IP network through LOLS." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 3 (January 8, 2015): 5543–49. http://dx.doi.org/10.24297/ijct.v14i3.1998.

Full text
Abstract:
It has been observed that IP networks are vulnerable to many kinds of attacks. Among the various attacks possible in IP networks wormhole attack is one which is treated as a very severe attack. In LOLS, multiple failures are handled but network attack is not detected. LOLS cannot handle any kind of attack and this is the reason why we are working on wormhole attack and its detection by using AOMDV algorithm. In this attack a harmful node records packets at one end in the network and tunnels them to another harmful node which is present in the other end of the network. In this paper, we have proposed an algorithm which detects and avoids the wormhole attack while data transfer . In this paper one mechanism is used, which is based on the total round trip time (RTT) of current route and the average round trip times This mechanism works for both mobile ad hoc networks and wireless ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Ramírez Gómez, Julián, Héctor Fernando Vargas Montoya, and Álvaro León Henao. "Implementing a Wormhole Attack on Wireless Sensor Networks with XBee S2C Devices." Revista Colombiana de Computación 20, no. 1 (May 28, 2019): 41–58. http://dx.doi.org/10.29375/25392115.3606.

Full text
Abstract:
One of the most dangerous threats to Wireless Sensor Networks (WSN) are wormhole attacks, due to their capacity to manipulate routing and application data in real time and cause important damages to the integrity, availability, and confidentiality of network data. An empirical method to launch a successful attack on IEEE 802.15.4/Zigbee devices with source routing enabled is adopted in this work to find signatures for detecting wormhole attacks in real environments. It uses the KillerBee framework with algorithms for packet manipulation through a malicious node to capture and inject malicious packets in victim nodes. Besides, a reverse variant of wormhole attack is presented and executed. To evidence the realization of this threat by the attacking software, the experimental framework includes XBee S2C nodes. The results include recommendations, detection signatures and future work to face wormhole attacks involving source routing protocols like DSR.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wormhole Attack"

1

Gorlatova, Maria A. "Wormhole attack detection in wireless ad hoc networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27459.

Full text
Abstract:
This thesis deals with wormhole attack discovery in mobile wireless ad hoc networks. Two separate approaches to wormhole attack discovery are developed in this thesis. One approach -- based on protocol-breaking -- allows detection of wormholes that disrupt network operations by dropping network packets. Another -- a novel frequency-based analysis of periodic network messages -- detects wormholes that do not drop traffic. The developed wormhole attack discovery techniques are local, do not rely on specialized hardware or clock synchronization, and do not require modification to existing ad hoc network routing protocols. In addition, tools that are necessary for ad hoc network attack research are created. Network traffic analyzer modules applicable to ad hoc network research are developed and tested. Also, a realistic implementation of a wormhole attack in the NS-2 network simulator is created.
APA, Harvard, Vancouver, ISO, and other styles
2

Karlsson, Jonny. "A unified wormhole attack detection framework for mobile ad hoc networks." Thesis, Open University, 2017. http://oro.open.ac.uk/48643/.

Full text
Abstract:
The Internet is experiencing an evolution towards a ubiquitous network paradigm, via the so-called internet-of-things (IoT), where small wireless computing devices like sensors and actuators are integrated into daily activities. Simultaneously, infrastructure-less systems such as mobile ad hoc networks (MANET) are gaining popularity since they provide the possibility for devices in wireless sensor networks or vehicular ad hoc networks to share measured and monitored information without having to be connected to a base station. While MANETs offer many advantages, including self-configurability and application in rural areas which lack network infrastructure, they also present major challenges especially in regard to routing security. In a highly dynamic MANET, where nodes arbitrarily join and leave the network, it is difficult to ensure that nodes are trustworthy for multi-hop routing. Wormhole attacks belong to most severe routing threats because they are able to disrupt a major part of the network traffic, while concomitantly being extremely difficult to detect.



This thesis presents a new unified wormhole attack detection framework which is effective for all known wormhole types, alongside incurring low false positive rates, network loads and computational time, for a variety of diverse MANET scenarios. The framework makes three original technical contributions: i) a new accurate wormhole detection algorithm based on packet traversal time and hop count analysis (TTHCA) which identifies infected routes, ii) an enhanced, dynamic traversal time per hop analysis (TTpHA) detection model which is adaptable to node radio range fluctuations, and iii) a method for automatically detecting time measurement tampering in both TTHCA and TTpHA.



The thesis findings indicate that this new wormhole detection framework provides significant performance improvements compared to other existing solutions by accurately, efficiently and robustly detecting all wormhole variants under a wide range of network conditions.
APA, Harvard, Vancouver, ISO, and other styles
3

Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.

Full text
Abstract:
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In-band, out of band, hidden wormhole attack, active wormhole attack) in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the wormhole nodes can be tracked down by the proposed ANN-based detection scheme. We evaluate the efficacy of the proposed detection scheme in terms of detection accuracy, false positive rate, and false negative rate. The performance of the proposed model is also compared with other machine learning techniques (i.e. SVM and regularized nonlinear logistic regression (LR) based detection models) based detection schemes. The simulation results show that proposed ANN-based detection model outperforms the SVM and LR based detection schemes in terms of detection accuracy, false positive rate, and false negative rates.
February 2017
APA, Harvard, Vancouver, ISO, and other styles
4

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Full text
Abstract:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination. The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application. Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi??hop propagation of program images. Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi??hop code dissemination protocol. Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol. We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip.
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia, Luis Fernando. "Preventing layer-3 wormhole attacks in ad hoc networks with multipath DSR." Mémoire, École de technologie supérieure, 2009. http://espace.etsmtl.ca/48/1/GARCIA_Luis_Fernando.pdf.

Full text
Abstract:
Un réseau sans fil ad hoc ne requiert aucune infrastructure préexistante ni aucune autorité centrale. C’est un réseau déployé de façon dynamique. Les noeuds doivent participer activement et coopérer avec les fonctions basics dans le réseau telles que le routage, l’adressage et la sécurité. Grâce à leur mobilité, les noeuds rompent et créent des liens dynamiquement, favorisant la constante évolution de la topologie du réseau. Dans les réseaux ad hoc, l’attaque wormhole est une attaque sévère où deux noeuds malveillants redirigent le trafic entre deux extrémités. Ces noeuds malicieux manipulent l’algorithme de routage, contrôlant ainsi l’information partagéé entre les noeuds honnêtes. La plupart des solutions proposées dans la littérature nécessitent des ressources exceptionnelles. Dans la première partie de cette thèse, nous présentons une vaste revue de la littérature des plus importantes solutions proposées pour contrer les attaques wormhole. Dans la deuxième partie, nous proposons un nouveau protocole nommé WIM-DSR pour détecter et éviter les attaques wormhole dans les réseaux ad hoc. Cette solution exploite l'information du réseau additionnel obtenue lorsqu’un protocole de routage multi-chemin est utilisé. Avec cette information supplémentaire, le protocole WIM-DSR recherche des comportements suspects liés aux attaques wormhole. Nous avons pu démontrer dans cette thèse que WIM-DSR offre une solution solide contre les attaques wormhole sans nécessiter de ressources exceptionnelles. En utilisant seulement de l’information déjà existante dans le réseau.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Cheng-Jiun, and 李承駿. "A Study on Wormhole Attack in Mobile Ad hoc networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/m6p242.

Full text
Abstract:
碩士
銘傳大學
資訊傳播工程學系碩士班
96
In Mobile Ad hoc Networks(MANET), because of lock some infrastructural to helping routing. Every source node need to use routing protocol to helping find the way to destination node. We notice that some famous routing protocols were focus on energy or transmission efficacy, almost have no resistances on malicious behavior. Although some security routing protocols was proposed to resist some malicious behavior. But still have some limitations to resist wormhole attack. Because of the behavior of wormhole attacker is hardly to recognized. So, we can say wormhole attack is one the most threatened attack in MANET. In this paper, we proposed an AODV based secure routing protocol, named AWAODV(avoid-wormhole AODV) to fight against wormhole. AWAODV used the concepts of multi-path routing, but it still transmission data with the only one path. AWAODV can not only detect wormhole node but also isolate these malicious nodes. This motivation is derived from the observation that wormhole node has extremely ability to attract the data packet get through itself. So their neighbors will deny forwarding any RREP from the suspicious node which anomaly value excess the threshold. After a period of time, such wormhole node will be isolated from the MANET.
APA, Harvard, Vancouver, ISO, and other styles
7

CHU, TING-HUI, and 朱庭輝. "Wireless Ad hoc Network: Wormhole Attack Detection and Emergency Message Broadcast Strategy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/uw725s.

Full text
Abstract:
博士
國立暨南國際大學
資訊工程學系
106
In recent years, the Vehicular ad hoc networks (VANETs) is a very popular research topic, and the information exchange can be grasped through the exchange of information between vehicles. In addition to the general exchange of information, the notification of urgent messages is even more important. The broadcast of emergency messages can be used to understand the driving situation early, avoid the blocked roads early, and quickly notify other vehicles after an emergency to avoid secondary accidents. This study proposes two kinds of emergency message broadcasting strategies. It is mainly the emergency message broadcast multi-hop communication protocol in the V2V communication mode. In both of our proposed methods 1 and 2, we hope to achieve a 100% acceptance rate of emergency messages and maintain a relatively low latency. Unlike many of the proposed studies, the pursuit of lower latency is actually lower than the human instinct. This study proposes a 100% acceptance rate, hoping to ensure that all vehicles are able to receive urgent messages, and secondly to reduce the delay time. In addition, wormhole attacks are a network security issue in wireless sensor networks (WSNs). After the nearby state is collected by the sensor, the data is transmitted to the collecting station by means of multi-hop transmission. However, a malicious attack will cause the sensor to establish an incorrect routing table and will not be able to return the data to the data station, causing the sensor power loss to shorten the service life. We propose a wormhole detection method that does not require the use of additional network equipment and does not require a lot of complex computations. Our method uses a change in the number of neighbors and a simple moving average (SMA) calculation to detect the presence of wormhole attacks in the scene, and uses the Quantum-inspired Tabu Search (QTS) algorithm with AND gates and OR gates to find the best detection rules. The experimental results show that our method has good detection performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Obado, Victor Owino. "A hidden Markov model process for wormhole attack detection in a localised underwater wireless sensor network." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

HE, KUAN-HSIEN, and 何冠賢. "Using Quantum-inspired Tabu Search Algorithm with logic operation and moving average for wormhole attack detection in WSN." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33909415125878767549.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
105
Wireless sensor networks (WSN) are composed of sensors and applied in many fields, such as military, ecological and environmental monitoring. The wormhole attack problem is one of important security issues in WSN. The wormhole is consisted of one or more pairs of malicious nodes. When a node moves to the sensing range of the wormhole, it will receive the neighbor information through the special tunnel from the other wormhole. It may cause many problems such as packets routing error, reduce the lifetime of the sensor and let the entire of network topology damage. However, several methods have been proposed that using special hardware devices or lots of resource consumption. In this paper, we improve the method which utilizes the neighbor information collected by mobile nodes without extra hardware, complex calculation and lots of resource consumption. Using moving average (MA) indicator and combines with logic operation, AND gates and OR gates. And using Quantum-inspired Tabu Search (QTS) algorithm to effectively find the combinations to detect wormhole. However, we change an uncommon mobility model of nodes to a general one, and utilize the characteristic of mobility model to detect the node moves into the wormhole and out of the wormhole. Finally, the simulation results show that the proposed method with great performance uses less resources but still efficiently detects wormhole in different node density and transmission range.
APA, Harvard, Vancouver, ISO, and other styles
10

JAO, MENG-HSIU, and 饒孟修. "A Novel Wormhole Attack Detection in WSN: Using Quantum Inspired Tabu Search Algorithm with Logic Operation and Moving Average." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/21802494897300450540.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
104
Wireless sensor networks (WSN) can be widely used in many areas, such as environment monitoring, weather forecasting, traffic control, etc. The wormhole attack problem is an important issue in WSN since it causes many problems, such as routing error, a reduction of sensor lifetime and broken network topology. Several wormhole detection approaches have been proposed, but most of them need special hardware devices and consume a lot of system resources. This paper proposes a novel and efficient method to detect the wormhole attack without hardware equipment or requiring much information about WSN. The proposed method uses a moving average (MA) indicator, which has been commonly used in financial fields, to apply to neighbors of sensor nodes; it becomes a dynamic detection indicator of the number of neighbor nodes. Furthermore, we design a fair calculation of detection rate. Because the combinations are too numerous to arrange, we utilize a Quantum-inspired Tabu Search (QTS) algorithm. This algorithm is efficient and effective in finding the ideal combination of detection indicators to detect wormhole attacks in different scenarios. It is a novel view to change the guide of QTS into searching the rules which have great performance on the situation that sensors meet wormhole and then compare with another. The simulation result shows our method is intuitive and efficiently detects wormhole in different maps which all have great performance.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Wormhole Attack"

1

King, Stephen. Skeleton Crew. London: Futura, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

King, Stephen. Skeleton Crew. 4th ed. New York, USA: G.P. Putnam's Sons, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

King, Stephen. Skeleton crew. London: BCA, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

King, Stephen. Skeleton Crew. New York, USA: New American Library, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

King, Stephen. Skeleton crew. London: Guild, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

King, Stephen. Komanda skeletov. Moskva: AST, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

King, Stephen. Skeleton crew. New York: G.P. Putnam's Sons, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

King, Stephen. Sis. Istanbul: Aetin Kitoplar, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

King, Stephen. Skeleton Crew. New York, USA: New American Library, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

King, Stephen. Skeleton Crew. New York: Penguin USA, Inc., 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Wormhole Attack"

1

Modirkhazeni, Ali, Norafida Ithnin, Mohammed M. Kadhum, and Teddy Mantoro. "Mitigation of Wormhole Attack in Wireless Sensor Networks." In Atlantis Ambient and Pervasive Intelligence, 109–47. Paris: Atlantis Press, 2012. http://dx.doi.org/10.2991/978-94-91216-71-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hazra, Swarnali, and S. K. Setua. "Trusted Routing in AODV Protocol Against Wormhole Attack." In Lecture Notes in Electrical Engineering, 259–69. Dordrecht: Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-4516-2_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yadav, Jyoti, and Mukesh Kumar. "Detection of Wormhole Attack in Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 243–50. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-0129-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Aswale, Anjali B., and Radhika D. Joshi. "Security Enhancement by Preventing Wormhole Attack in MANET." In Lecture Notes in Networks and Systems, 225–37. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3172-9_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Karapistoli, Eirini, Panagiotis Sarigiannidis, and Anastasios A. Economides. "Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 222–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23829-6_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bagade, Sudhir, and Vijay Raisinghani. "JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET." In Information Systems Security, 444–58. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49806-5_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhang, Yu, and Xin Feng. "Ad Hoc LAN Protocol-Based Defense Wormhole Attack Method." In Recent Advances in Computer Science and Information Engineering, 195–201. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25766-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Patel, Manish, Akshai Aggarwal, and Nirbhay Chaubey. "Detection of Wormhole Attack in Static Wireless Sensor Networks." In Advances in Intelligent Systems and Computing, 463–71. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0344-9_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dutta, Nishigandha, and Moirangthem Marjit Singh. "Wormhole Attack in Wireless Sensor Networks: A Critical Review." In Advanced Computing and Communication Technologies, 147–61. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0680-8_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Pranav Kumar, Rahul Raj Gupta, Sunit Kumar Nandi, and Sukumar Nandi. "Machine Learning Based Approach to Detect Wormhole Attack in VANETs." In Advances in Intelligent Systems and Computing, 651–61. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-15035-8_63.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wormhole Attack"

1

Khan, Zubair Ahmed, and M. Hasan Islam. "Wormhole attack: A new detection technique." In 2012 International Conference on Emerging Technologies (ICET). IEEE, 2012. http://dx.doi.org/10.1109/icet.2012.6375443.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Patel, Anal, Nimisha Patel, and Rajan Patel. "Defending against Wormhole Attack in MANET." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

T, Divya Sai Keerthi, and Pallapa Venkataram. "Analysis of Wormhole Attack Confirmation System During Email Dumping Attack." In 7th International Conference on Computer Science, Engineering & Applications. Academy & Industry Research Collaboration Center (AIRCC), 2017. http://dx.doi.org/10.5121/csit.2017.71104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keerthi, T. Divya Sai, and Pallapa Venkataram. "Locating the Attacker of Wormhole Attack by Using the Honeypot." In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2012. http://dx.doi.org/10.1109/trustcom.2012.196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Song, Ronggong, Peter C. Mason, and Ming Li. "Enhancement of frequency-based wormhole attack detection." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Akila, A., D. Mahalakshmi, and C. Saranya. "Recovering system recital by noticing wormhole attack." In 2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS). IEEE, 2016. http://dx.doi.org/10.1109/icetets.2016.7603016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Madhu, Ashish Jain, and Shweta Shah. "Wormhole attack in mobile ad-hoc networks." In 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016. http://dx.doi.org/10.1109/cdan.2016.7570868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sarkar, Pratima, Chinmoy Kar, Biswaraj Sen, and Kalpana Sharma. "Sensitivity analysis on AODV with Wormhole attack." In 2016 2nd International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2016. http://dx.doi.org/10.1109/ngct.2016.7877520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Patel, Mousam A., and Manish M. Patel. "Wormhole Attack Detection in Wireless Sensor Network." In 2018 International Conference on Inventive Research in Computing Applications (ICIRCA). IEEE, 2018. http://dx.doi.org/10.1109/icirca.2018.8597366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bendjima, Mostefa, and Mohammed Feham. "Wormhole attack detection in wireless sensor networks." In 2016 SAI Computing Conference (SAI). IEEE, 2016. http://dx.doi.org/10.1109/sai.2016.7556151.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography