Dissertations / Theses on the topic 'Wormhole Attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 dissertations / theses for your research on the topic 'Wormhole Attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gorlatova, Maria A. "Wormhole attack detection in wireless ad hoc networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27459.
Full textKarlsson, Jonny. "A unified wormhole attack detection framework for mobile ad hoc networks." Thesis, Open University, 2017. http://oro.open.ac.uk/48643/.
Full textThis thesis presents a new unified wormhole attack detection framework which is effective for all known wormhole types, alongside incurring low false positive rates, network loads and computational time, for a variety of diverse MANET scenarios. The framework makes three original technical contributions: i) a new accurate wormhole detection algorithm based on packet traversal time and hop count analysis (TTHCA) which identifies infected routes, ii) an enhanced, dynamic traversal time per hop analysis (TTpHA) detection model which is adaptable to node radio range fluctuations, and iii) a method for automatically detecting time measurement tampering in both TTHCA and TTpHA.
The thesis findings indicate that this new wormhole detection framework provides significant performance improvements compared to other existing solutions by accurately, efficiently and robustly detecting all wormhole variants under a wide range of network conditions.
Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.
Full textFebruary 2017
Tan, Hailun Computer Science & Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.
Full textGarcia, Luis Fernando. "Preventing layer-3 wormhole attacks in ad hoc networks with multipath DSR." Mémoire, École de technologie supérieure, 2009. http://espace.etsmtl.ca/48/1/GARCIA_Luis_Fernando.pdf.
Full textLee, Cheng-Jiun, and 李承駿. "A Study on Wormhole Attack in Mobile Ad hoc networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/m6p242.
Full text銘傳大學
資訊傳播工程學系碩士班
96
In Mobile Ad hoc Networks(MANET), because of lock some infrastructural to helping routing. Every source node need to use routing protocol to helping find the way to destination node. We notice that some famous routing protocols were focus on energy or transmission efficacy, almost have no resistances on malicious behavior. Although some security routing protocols was proposed to resist some malicious behavior. But still have some limitations to resist wormhole attack. Because of the behavior of wormhole attacker is hardly to recognized. So, we can say wormhole attack is one the most threatened attack in MANET. In this paper, we proposed an AODV based secure routing protocol, named AWAODV(avoid-wormhole AODV) to fight against wormhole. AWAODV used the concepts of multi-path routing, but it still transmission data with the only one path. AWAODV can not only detect wormhole node but also isolate these malicious nodes. This motivation is derived from the observation that wormhole node has extremely ability to attract the data packet get through itself. So their neighbors will deny forwarding any RREP from the suspicious node which anomaly value excess the threshold. After a period of time, such wormhole node will be isolated from the MANET.
CHU, TING-HUI, and 朱庭輝. "Wireless Ad hoc Network: Wormhole Attack Detection and Emergency Message Broadcast Strategy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/uw725s.
Full text國立暨南國際大學
資訊工程學系
106
In recent years, the Vehicular ad hoc networks (VANETs) is a very popular research topic, and the information exchange can be grasped through the exchange of information between vehicles. In addition to the general exchange of information, the notification of urgent messages is even more important. The broadcast of emergency messages can be used to understand the driving situation early, avoid the blocked roads early, and quickly notify other vehicles after an emergency to avoid secondary accidents. This study proposes two kinds of emergency message broadcasting strategies. It is mainly the emergency message broadcast multi-hop communication protocol in the V2V communication mode. In both of our proposed methods 1 and 2, we hope to achieve a 100% acceptance rate of emergency messages and maintain a relatively low latency. Unlike many of the proposed studies, the pursuit of lower latency is actually lower than the human instinct. This study proposes a 100% acceptance rate, hoping to ensure that all vehicles are able to receive urgent messages, and secondly to reduce the delay time. In addition, wormhole attacks are a network security issue in wireless sensor networks (WSNs). After the nearby state is collected by the sensor, the data is transmitted to the collecting station by means of multi-hop transmission. However, a malicious attack will cause the sensor to establish an incorrect routing table and will not be able to return the data to the data station, causing the sensor power loss to shorten the service life. We propose a wormhole detection method that does not require the use of additional network equipment and does not require a lot of complex computations. Our method uses a change in the number of neighbors and a simple moving average (SMA) calculation to detect the presence of wormhole attacks in the scene, and uses the Quantum-inspired Tabu Search (QTS) algorithm with AND gates and OR gates to find the best detection rules. The experimental results show that our method has good detection performance.
Obado, Victor Owino. "A hidden Markov model process for wormhole attack detection in a localised underwater wireless sensor network." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000399.
Full textHE, KUAN-HSIEN, and 何冠賢. "Using Quantum-inspired Tabu Search Algorithm with logic operation and moving average for wormhole attack detection in WSN." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33909415125878767549.
Full text國立暨南國際大學
資訊工程學系
105
Wireless sensor networks (WSN) are composed of sensors and applied in many fields, such as military, ecological and environmental monitoring. The wormhole attack problem is one of important security issues in WSN. The wormhole is consisted of one or more pairs of malicious nodes. When a node moves to the sensing range of the wormhole, it will receive the neighbor information through the special tunnel from the other wormhole. It may cause many problems such as packets routing error, reduce the lifetime of the sensor and let the entire of network topology damage. However, several methods have been proposed that using special hardware devices or lots of resource consumption. In this paper, we improve the method which utilizes the neighbor information collected by mobile nodes without extra hardware, complex calculation and lots of resource consumption. Using moving average (MA) indicator and combines with logic operation, AND gates and OR gates. And using Quantum-inspired Tabu Search (QTS) algorithm to effectively find the combinations to detect wormhole. However, we change an uncommon mobility model of nodes to a general one, and utilize the characteristic of mobility model to detect the node moves into the wormhole and out of the wormhole. Finally, the simulation results show that the proposed method with great performance uses less resources but still efficiently detects wormhole in different node density and transmission range.
JAO, MENG-HSIU, and 饒孟修. "A Novel Wormhole Attack Detection in WSN: Using Quantum Inspired Tabu Search Algorithm with Logic Operation and Moving Average." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/21802494897300450540.
Full text國立暨南國際大學
資訊工程學系
104
Wireless sensor networks (WSN) can be widely used in many areas, such as environment monitoring, weather forecasting, traffic control, etc. The wormhole attack problem is an important issue in WSN since it causes many problems, such as routing error, a reduction of sensor lifetime and broken network topology. Several wormhole detection approaches have been proposed, but most of them need special hardware devices and consume a lot of system resources. This paper proposes a novel and efficient method to detect the wormhole attack without hardware equipment or requiring much information about WSN. The proposed method uses a moving average (MA) indicator, which has been commonly used in financial fields, to apply to neighbors of sensor nodes; it becomes a dynamic detection indicator of the number of neighbor nodes. Furthermore, we design a fair calculation of detection rate. Because the combinations are too numerous to arrange, we utilize a Quantum-inspired Tabu Search (QTS) algorithm. This algorithm is efficient and effective in finding the ideal combination of detection indicators to detect wormhole attacks in different scenarios. It is a novel view to change the guide of QTS into searching the rules which have great performance on the situation that sensors meet wormhole and then compare with another. The simulation result shows our method is intuitive and efficiently detects wormhole in different maps which all have great performance.
Hsu, Sung-Chien, and 許嵩健. "Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/fx5895.
Full text國立中山大學
資訊管理學系研究所
104
Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in 2013, which upgraded the protocol of wireless sensor network from IPv4 to IPv6, and solved the issue of the insufficient IP addresses. However, IPv6 wireless sensor network still faces wormhole attacks. The Wormhole attacks generate a wormhole tunnel, and cause neighbors to go through it. Which means the attackers can sniff, modify, or drop packets. There are still some limitations in detecting method of wormhole attack in researches. For example, some researches require GPS support or precise synchronized time in the system. This paper proposes wormhole detection system. Without any other hardware and system support, our solution analyst packets through RPL standard routing protocol only. We have a good detection rate, according to our experimental results.
Chieng, Kun-Lin, and 江昆霖. "Intrusion Detection Systems for Preventing Blackhole Attacks and Wormhole Attacks in Mobile Ad hoc Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/57877289563735684640.
Full text銘傳大學
資訊工程學系碩士班
97
In all kinds of attacks in MANETs, blackhole attacks and wormhole attacks cause the greatest threat, and are very hard to predict and detect. Black hole attack is one of the big problems in Ad Hoc Networks, in which a malicious node sends a forged route reply packet to a source node that initiates the route discovery in order to deprive the route from the source node to the destination node, and then drop all data packets passed by. As to wormhole attacks, a malicious node puts the captured routing packet in a data packet payload, and uses normal nodes to transmit the data packet to another malicious node which draws the routing packet out of the packet payload and further broadcasts or propagates it. In this way, the hop count can be reduced to increase the chance of acquiring the path. This study is going to propose a framework by intrusion detection systems (IDSs) to prevent both blackhole attacks and wormhole attacks at the same time. The proposed mechanism is called ABWM (Anti-Blackhole & Wormhole Mechanism). Some IDS nodes set in sniffing mode are deployed in a MANET to watch out routing packets. If a node processes routing messages improperly, then it may be identified as a malicious node by its neighboring IDS nodes and then be isolated by the whole network. According to ns2 experiments, the IDS nodes can rapidly identify and isolate a malicious node with no false positives in some cases.
Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT." Master's thesis, 2021. http://hdl.handle.net/10316/95492.
Full textO presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
Li, Bing-Jung, and 李秉峻. "A Communication Protocol for Prevention of Wormhole Attacks Based on Wireless Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/du3dde.
Full text國立中正大學
資訊管理系研究所
104
Information security is very important today, everyone is easy to been attack by a malicious attacker to steal data, even disguised fake information to anyone; wherein in a wireless network environment, due to the characteristics of the mobile node to make mobile devices more easily to been attack by malicious people when establish a connection . As the development of smart phones, the ratio of people who rely on mobile devices to surf of Internet are increasing, when the malicious attacks make more damage; In so many attacks in wireless network ,wormhole attack is the most difficult to prevent and detect, and once there wormholes exist and attack the network , the attacker can easily paralyze the Internet, tapping Information, forged information, very easy to be able to have a significant impact on the network. In our research will focus on the wormhole attack, we carried out a three-stage process when the node establish a connection and transmit the information: preparation phase, trading phase and release phase of operation. With our three stages, we not only achieve the goal to prevention of unauthorized malicious attackers to attack, but also to avoid the interior malicious attacker who has authorized cannot easily get the message contents, when a new node is add , it can quickly to know the secure connection topology.
Liu, Bang-Jheng, and 劉邦正. "An Intrusion Prevention Scheme for Wormhole Attacks in Mobile Ad Hoc Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10569044017789253921.
Full text大葉大學
資訊管理學系碩士班
96
In recent years, wireless ad hoc networks is an increasingly popular topic. It is a node-to-node transmission model. The nodes communicate with each other via wireless ad hoc networks technology, and thus form wireless local area networks. Nowadays, some literature points out that this kind of framework encounters lots of security threats, such as location disclosure, routing table poisoning, wormhole attack and so on. However, the wormhole attack is a more serious threat among them because most secure route mechanisms can not effectively avoid it. This kind of attack gets better transmission parameters than normal route does by quicker transmission through two malicious nodes. And then it controls the route operation under some sections of environment in order to devastate or steal confidential information. Although at present many scholars proposed that wormhole attacks can be detected by intrusion detection systems, most detection mechanisms still rely on special hardware, consume enormous system resources or need to make propose some assumptions which are not under wireless conditions. Consequently, in this thesis, we design an intrusion prevention scheme which needs only low system resources in mobile ad hoc networks to avoid the wormhole attack effectively.
Wang, Wei-Ming, and 王偉民. "An auto-resilient routing protocol against wormhole attacks in Mobile Ad-hoc network." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/73904599196290623614.
Full text國立交通大學
資訊科學與工程研究所
97
The Mobile Ad-hoc networks (MANETs) are self-configuring network and each node in MANETs is free to move and has the ability to route packets. However, these characteristics will give rise to Wormhole attack which will increase the influences of network attacks. In recent years, the methods how to avoid wormhole attacks have become attractive research issues. However, many previous works focus on observing the behavior of wormhole node to solve the attack issues. We thought against wormhole attack utilizing the routing characteristics of MANETs will has the better resulting of avoiding attacks. We researched the routing protocol of MANETs, present the wormhole attacks using the weakness of routing protocols and we will propose a robust routing protocol to solve the wormhole attacks.
Jen, Shang-Ming, and 任上鳴. "Defending Wormhole Attacks in Wireless Ad Hoc Networks: An Efficient Routing Mechanism with Hop Count Analysis." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/53415195476120803432.
Full text國立成功大學
電腦與通信工程研究所
95
The wireless ad-hoc network is a kind of newly risen network system. With the ability of self-organization, nodes in the network can automatically form a communication system without infrastructure. However, there are serious security issues in this kind of network due to its wireless transmissions. For example, eavesdrop, modification and Denial of Service (DoS), and so on, are some common attacks. The attackers usually have to use some angles to take the right of routing in order to launch these attacks. The wormhole attack is an effective angle. The routes which go through a wormhole tunnel formed by attackers may have better transmission parameters than normal ones, so that malicious nodes can easily have the right of routing. Until now, many researches against this problem have been proposed. For examples, Wang et al. constructed a visualization system; Hu et al. presented a method of packet leashes; and Lazos et al. gave a graph theory approach, etc. Most of these works detect wormhole from the viewpoint of administrators. Some special hardware or enormous computations are needed for finding the wormhole in most of these methods. Besides, they usually depend on some impractical assumptions of network environment. In this paper, we propose an efficient mechanism, the HCA routing protocol, from users’ viewpoint to avoid some routes which are obviously unsafe. We analyze the hop count values in the route reply (RREP) packets and do not have to confirm the existence of the wormhole. We verify the performance through three experiments and conclude that we can successfully avoid most of the wormhole without any hardware supported. In addition, our HCA protocol does not need any environment assumptions and can be directly adapted in the mobile ad-hoc networks.
DING, WEI-JIUN, and 丁偉峻. "A Wormhole Attacks Detection in WSN Using Multiple Moving Averages based on Quantum-inspired Tabu Search Algorithm and Sliding Window." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/t2p4zf.
Full text國立暨南國際大學
資訊工程學系
106
Wormhole attack problem is one of the important security issues in the wireless sensing network(WSN), which may shorten the life of the sensor and damage the structure of the entire network topology. The method of the physical device, or the use of node information to construct the network topology, we have improved the method of using the neighbor information collected by the mobile node, and combined with moving average(MA) and the quantum-inspired tabu search algorithm(QTS) to detect wormhole attacks. However, we use the characteristics of the mobile model to propose a method that uses less resources but still effectively detects wormhole attacks. . In this paper, we have improved the use of mobile nodes to collect neighbor information without the need for additional hardware devices, complex calculations and large resource consumption methods, using moving average(MA) and quantum -inspired tabu search algorithm to find rules and detect wormhole attacks. However, we use the characteristics of the moving model to detect when the node moves. And the signal leaving the wormhole, the final experimental results show that the method has superior performance and low resource utilization, but can still effectively detect wormholes with different node densities and transmission distances.