To see the other types of publications on this topic, follow the link: Wormhole Attack.

Dissertations / Theses on the topic 'Wormhole Attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Wormhole Attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gorlatova, Maria A. "Wormhole attack detection in wireless ad hoc networks." Thesis, University of Ottawa (Canada), 2007. http://hdl.handle.net/10393/27459.

Full text
Abstract:
This thesis deals with wormhole attack discovery in mobile wireless ad hoc networks. Two separate approaches to wormhole attack discovery are developed in this thesis. One approach -- based on protocol-breaking -- allows detection of wormholes that disrupt network operations by dropping network packets. Another -- a novel frequency-based analysis of periodic network messages -- detects wormholes that do not drop traffic. The developed wormhole attack discovery techniques are local, do not rely on specialized hardware or clock synchronization, and do not require modification to existing ad hoc network routing protocols. In addition, tools that are necessary for ad hoc network attack research are created. Network traffic analyzer modules applicable to ad hoc network research are developed and tested. Also, a realistic implementation of a wormhole attack in the NS-2 network simulator is created.
APA, Harvard, Vancouver, ISO, and other styles
2

Karlsson, Jonny. "A unified wormhole attack detection framework for mobile ad hoc networks." Thesis, Open University, 2017. http://oro.open.ac.uk/48643/.

Full text
Abstract:
The Internet is experiencing an evolution towards a ubiquitous network paradigm, via the so-called internet-of-things (IoT), where small wireless computing devices like sensors and actuators are integrated into daily activities. Simultaneously, infrastructure-less systems such as mobile ad hoc networks (MANET) are gaining popularity since they provide the possibility for devices in wireless sensor networks or vehicular ad hoc networks to share measured and monitored information without having to be connected to a base station. While MANETs offer many advantages, including self-configurability and application in rural areas which lack network infrastructure, they also present major challenges especially in regard to routing security. In a highly dynamic MANET, where nodes arbitrarily join and leave the network, it is difficult to ensure that nodes are trustworthy for multi-hop routing. Wormhole attacks belong to most severe routing threats because they are able to disrupt a major part of the network traffic, while concomitantly being extremely difficult to detect.



This thesis presents a new unified wormhole attack detection framework which is effective for all known wormhole types, alongside incurring low false positive rates, network loads and computational time, for a variety of diverse MANET scenarios. The framework makes three original technical contributions: i) a new accurate wormhole detection algorithm based on packet traversal time and hop count analysis (TTHCA) which identifies infected routes, ii) an enhanced, dynamic traversal time per hop analysis (TTpHA) detection model which is adaptable to node radio range fluctuations, and iii) a method for automatically detecting time measurement tampering in both TTHCA and TTpHA.



The thesis findings indicate that this new wormhole detection framework provides significant performance improvements compared to other existing solutions by accurately, efficiently and robustly detecting all wormhole variants under a wide range of network conditions.
APA, Harvard, Vancouver, ISO, and other styles
3

Shaon, Mohammad. "A computationally intelligent approach to the detection of wormhole attacks in wireless sensor networks." World Comp,14th International Conference on Wireless Networks, 2015, 2015. http://hdl.handle.net/1993/31981.

Full text
Abstract:
This thesis proposes an innovative wormhole detection scheme to detect wormhole attacks using computational intelligence and an artificial neural network (ANN). The aim of the proposed research is to develop a detection scheme that can detect wormhole attacks (In-band, out of band, hidden wormhole attack, active wormhole attack) in both uniformly and non-uniformly distributed sensor networks. Furthermore, the proposed research does not require any special hardware and causes no significant network overhead throughout the network. Most importantly, the probable location of the wormhole nodes can be tracked down by the proposed ANN-based detection scheme. We evaluate the efficacy of the proposed detection scheme in terms of detection accuracy, false positive rate, and false negative rate. The performance of the proposed model is also compared with other machine learning techniques (i.e. SVM and regularized nonlinear logistic regression (LR) based detection models) based detection schemes. The simulation results show that proposed ANN-based detection model outperforms the SVM and LR based detection schemes in terms of detection accuracy, false positive rate, and false negative rates.
February 2017
APA, Harvard, Vancouver, ISO, and other styles
4

Tan, Hailun Computer Science &amp Engineering Faculty of Engineering UNSW. "Secure network programming in wireless sensor networks." Awarded By:University of New South Wales. Computer Science & Engineering, 2010. http://handle.unsw.edu.au/1959.4/44835.

Full text
Abstract:
Network programming is one of the most important applications in Wireless Sensor Networks as It provides an efficient way to update program Images running on sensor nodes without physical access to them. Securing these updates, however, remains a challenging and important issue, given the open deployment environment of sensor nodes. Though several security schemes have been proposed to impose the authenticity and Integrity protection on network programming applications, they are either energy Inefficient as they tend to use digital signature or lacks the data confidentiality. In addition, due to the absence of secure memory management in the current sensor hardware, the attacker could inject malicious code into the program flash by exploiting buffer overflow In the memory despite the secure code dissemination. The contribution of this thesis Is to provide two software-based security protocols and one hardware-based remote attestation protocol for network programming application. Our first protocol deploys multiple one-way key chains for a multi-hop sensor network. The scheme Is shown to be lower In computational, power consumption and communication costs yet still able to secure multi??hop propagation of program images. Our second protocol utilizes an Iterative hash structure to the data packets in network programming application, ensuring the data confidentiality and authenticity. In addition, we Integrated confidentiality and DoS-attack-resistance in a multi??hop code dissemination protocol. Our final solution is a hardware-based remote attestation protocol for verification of running codes on sensor nodes. An additional piece of tamper-proof hardware, Trusted Platform Module (TPM), is imposed into the sensor nodes. It secures the sensitive information (e.g., the session key) from attackers and monitors any platform environment changes with the Internal registers. With these features of TPM, the code Injection attack could be detected and removed when the contaminated nodes are challenged in our remote attestation protocol. We implement the first two software-based protocols with Deluge as the reference network programming protocol in TinyOS, evaluate them with the extensive simulation using TOSSIM and validate the simulation results with experiments using Tmote. We implement the remote attestation protocol on Fleck, a sensor platform developed by CSIRO that Integrates an Atmel TPM chip.
APA, Harvard, Vancouver, ISO, and other styles
5

Garcia, Luis Fernando. "Preventing layer-3 wormhole attacks in ad hoc networks with multipath DSR." Mémoire, École de technologie supérieure, 2009. http://espace.etsmtl.ca/48/1/GARCIA_Luis_Fernando.pdf.

Full text
Abstract:
Un réseau sans fil ad hoc ne requiert aucune infrastructure préexistante ni aucune autorité centrale. C’est un réseau déployé de façon dynamique. Les noeuds doivent participer activement et coopérer avec les fonctions basics dans le réseau telles que le routage, l’adressage et la sécurité. Grâce à leur mobilité, les noeuds rompent et créent des liens dynamiquement, favorisant la constante évolution de la topologie du réseau. Dans les réseaux ad hoc, l’attaque wormhole est une attaque sévère où deux noeuds malveillants redirigent le trafic entre deux extrémités. Ces noeuds malicieux manipulent l’algorithme de routage, contrôlant ainsi l’information partagéé entre les noeuds honnêtes. La plupart des solutions proposées dans la littérature nécessitent des ressources exceptionnelles. Dans la première partie de cette thèse, nous présentons une vaste revue de la littérature des plus importantes solutions proposées pour contrer les attaques wormhole. Dans la deuxième partie, nous proposons un nouveau protocole nommé WIM-DSR pour détecter et éviter les attaques wormhole dans les réseaux ad hoc. Cette solution exploite l'information du réseau additionnel obtenue lorsqu’un protocole de routage multi-chemin est utilisé. Avec cette information supplémentaire, le protocole WIM-DSR recherche des comportements suspects liés aux attaques wormhole. Nous avons pu démontrer dans cette thèse que WIM-DSR offre une solution solide contre les attaques wormhole sans nécessiter de ressources exceptionnelles. En utilisant seulement de l’information déjà existante dans le réseau.
APA, Harvard, Vancouver, ISO, and other styles
6

Lee, Cheng-Jiun, and 李承駿. "A Study on Wormhole Attack in Mobile Ad hoc networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/m6p242.

Full text
Abstract:
碩士
銘傳大學
資訊傳播工程學系碩士班
96
In Mobile Ad hoc Networks(MANET), because of lock some infrastructural to helping routing. Every source node need to use routing protocol to helping find the way to destination node. We notice that some famous routing protocols were focus on energy or transmission efficacy, almost have no resistances on malicious behavior. Although some security routing protocols was proposed to resist some malicious behavior. But still have some limitations to resist wormhole attack. Because of the behavior of wormhole attacker is hardly to recognized. So, we can say wormhole attack is one the most threatened attack in MANET. In this paper, we proposed an AODV based secure routing protocol, named AWAODV(avoid-wormhole AODV) to fight against wormhole. AWAODV used the concepts of multi-path routing, but it still transmission data with the only one path. AWAODV can not only detect wormhole node but also isolate these malicious nodes. This motivation is derived from the observation that wormhole node has extremely ability to attract the data packet get through itself. So their neighbors will deny forwarding any RREP from the suspicious node which anomaly value excess the threshold. After a period of time, such wormhole node will be isolated from the MANET.
APA, Harvard, Vancouver, ISO, and other styles
7

CHU, TING-HUI, and 朱庭輝. "Wireless Ad hoc Network: Wormhole Attack Detection and Emergency Message Broadcast Strategy." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/uw725s.

Full text
Abstract:
博士
國立暨南國際大學
資訊工程學系
106
In recent years, the Vehicular ad hoc networks (VANETs) is a very popular research topic, and the information exchange can be grasped through the exchange of information between vehicles. In addition to the general exchange of information, the notification of urgent messages is even more important. The broadcast of emergency messages can be used to understand the driving situation early, avoid the blocked roads early, and quickly notify other vehicles after an emergency to avoid secondary accidents. This study proposes two kinds of emergency message broadcasting strategies. It is mainly the emergency message broadcast multi-hop communication protocol in the V2V communication mode. In both of our proposed methods 1 and 2, we hope to achieve a 100% acceptance rate of emergency messages and maintain a relatively low latency. Unlike many of the proposed studies, the pursuit of lower latency is actually lower than the human instinct. This study proposes a 100% acceptance rate, hoping to ensure that all vehicles are able to receive urgent messages, and secondly to reduce the delay time. In addition, wormhole attacks are a network security issue in wireless sensor networks (WSNs). After the nearby state is collected by the sensor, the data is transmitted to the collecting station by means of multi-hop transmission. However, a malicious attack will cause the sensor to establish an incorrect routing table and will not be able to return the data to the data station, causing the sensor power loss to shorten the service life. We propose a wormhole detection method that does not require the use of additional network equipment and does not require a lot of complex computations. Our method uses a change in the number of neighbors and a simple moving average (SMA) calculation to detect the presence of wormhole attacks in the scene, and uses the Quantum-inspired Tabu Search (QTS) algorithm with AND gates and OR gates to find the best detection rules. The experimental results show that our method has good detection performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Obado, Victor Owino. "A hidden Markov model process for wormhole attack detection in a localised underwater wireless sensor network." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000399.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

HE, KUAN-HSIEN, and 何冠賢. "Using Quantum-inspired Tabu Search Algorithm with logic operation and moving average for wormhole attack detection in WSN." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/33909415125878767549.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
105
Wireless sensor networks (WSN) are composed of sensors and applied in many fields, such as military, ecological and environmental monitoring. The wormhole attack problem is one of important security issues in WSN. The wormhole is consisted of one or more pairs of malicious nodes. When a node moves to the sensing range of the wormhole, it will receive the neighbor information through the special tunnel from the other wormhole. It may cause many problems such as packets routing error, reduce the lifetime of the sensor and let the entire of network topology damage. However, several methods have been proposed that using special hardware devices or lots of resource consumption. In this paper, we improve the method which utilizes the neighbor information collected by mobile nodes without extra hardware, complex calculation and lots of resource consumption. Using moving average (MA) indicator and combines with logic operation, AND gates and OR gates. And using Quantum-inspired Tabu Search (QTS) algorithm to effectively find the combinations to detect wormhole. However, we change an uncommon mobility model of nodes to a general one, and utilize the characteristic of mobility model to detect the node moves into the wormhole and out of the wormhole. Finally, the simulation results show that the proposed method with great performance uses less resources but still efficiently detects wormhole in different node density and transmission range.
APA, Harvard, Vancouver, ISO, and other styles
10

JAO, MENG-HSIU, and 饒孟修. "A Novel Wormhole Attack Detection in WSN: Using Quantum Inspired Tabu Search Algorithm with Logic Operation and Moving Average." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/21802494897300450540.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
104
Wireless sensor networks (WSN) can be widely used in many areas, such as environment monitoring, weather forecasting, traffic control, etc. The wormhole attack problem is an important issue in WSN since it causes many problems, such as routing error, a reduction of sensor lifetime and broken network topology. Several wormhole detection approaches have been proposed, but most of them need special hardware devices and consume a lot of system resources. This paper proposes a novel and efficient method to detect the wormhole attack without hardware equipment or requiring much information about WSN. The proposed method uses a moving average (MA) indicator, which has been commonly used in financial fields, to apply to neighbors of sensor nodes; it becomes a dynamic detection indicator of the number of neighbor nodes. Furthermore, we design a fair calculation of detection rate. Because the combinations are too numerous to arrange, we utilize a Quantum-inspired Tabu Search (QTS) algorithm. This algorithm is efficient and effective in finding the ideal combination of detection indicators to detect wormhole attacks in different scenarios. It is a novel view to change the guide of QTS into searching the rules which have great performance on the situation that sensors meet wormhole and then compare with another. The simulation result shows our method is intuitive and efficiently detects wormhole in different maps which all have great performance.
APA, Harvard, Vancouver, ISO, and other styles
11

Hsu, Sung-Chien, and 許嵩健. "Detecting Wormhole Attacks on IPv6 Wireless Sensor Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/fx5895.

Full text
Abstract:
碩士
國立中山大學
資訊管理學系研究所
104
Recently, with the development of IPv6 and Internet, wireless sensor network becomes more popular in Internet of thing. ZigBee Alliance announced ZigBee IP specification in 2013, which upgraded the protocol of wireless sensor network from IPv4 to IPv6, and solved the issue of the insufficient IP addresses. However, IPv6 wireless sensor network still faces wormhole attacks. The Wormhole attacks generate a wormhole tunnel, and cause neighbors to go through it. Which means the attackers can sniff, modify, or drop packets. There are still some limitations in detecting method of wormhole attack in researches. For example, some researches require GPS support or precise synchronized time in the system. This paper proposes wormhole detection system. Without any other hardware and system support, our solution analyst packets through RPL standard routing protocol only. We have a good detection rate, according to our experimental results.
APA, Harvard, Vancouver, ISO, and other styles
12

Chieng, Kun-Lin, and 江昆霖. "Intrusion Detection Systems for Preventing Blackhole Attacks and Wormhole Attacks in Mobile Ad hoc Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/57877289563735684640.

Full text
Abstract:
碩士
銘傳大學
資訊工程學系碩士班
97
In all kinds of attacks in MANETs, blackhole attacks and wormhole attacks cause the greatest threat, and are very hard to predict and detect. Black hole attack is one of the big problems in Ad Hoc Networks, in which a malicious node sends a forged route reply packet to a source node that initiates the route discovery in order to deprive the route from the source node to the destination node, and then drop all data packets passed by. As to wormhole attacks, a malicious node puts the captured routing packet in a data packet payload, and uses normal nodes to transmit the data packet to another malicious node which draws the routing packet out of the packet payload and further broadcasts or propagates it. In this way, the hop count can be reduced to increase the chance of acquiring the path. This study is going to propose a framework by intrusion detection systems (IDSs) to prevent both blackhole attacks and wormhole attacks at the same time. The proposed mechanism is called ABWM (Anti-Blackhole & Wormhole Mechanism). Some IDS nodes set in sniffing mode are deployed in a MANET to watch out routing packets. If a node processes routing messages improperly, then it may be identified as a malicious node by its neighboring IDS nodes and then be isolated by the whole network. According to ns2 experiments, the IDS nodes can rapidly identify and isolate a malicious node with no false positives in some cases.
APA, Harvard, Vancouver, ISO, and other styles
13

Gonçalves, Luís Pedro Morais. "Sistema de deteção de intrusões em ambientes IoT." Master's thesis, 2021. http://hdl.handle.net/10316/95492.

Full text
Abstract:
Dissertação de Mestrado em Segurança Informática apresentada à Faculdade de Ciências e Tecnologia
O presente trabalho visa a mitigação da problemática associada à incidência de ataques Wormhole em redes operadas pelo protocolo de encaminhamento Routing Protocol for Low-Power and Lossy Networks (RPL). Este tipo de ataque pressupõe, tipicamente, a existência de pelo menos dois nós maliciosos na topologia que mantêm entre si uma ligação privada através da qual partilham pacotes legítimos. Esta prática motiva a que os nós que se encontrem nas imediações dos nós infetados assumam, erradamente, nós distantes como seus vizinhos. Ciente das limitações energéticas e computacionais dos dispositivos Internet of Things (IoT) e dado o seu vasto domínio aplicacional, torna-se importante o desenvolvimento de estratégias que promovam a segurança desta tecnologia. Neste seguimento, foi proposto um Intrusion Detection System (IDS), híbrido, baseado em assinaturas, vocacionado à identificação de ataques Wormhole neste tipo de ambiente. A estratégia de deteção desenvolvida passa pelo relacionamento da distância percorrida pelos pacotes, entre os nós remetente e destinatário, com a distância tida como referência para esse trajeto. Dado o seu princípio, o modelo pressupõe a previa determinação da distância entre nós vizinhos, bem como, a inclusão de novos campos nos pacotes em trânsito. A avaliação do sistema de deteção, por recurso a simulação com a ferramenta Cooja, mostrou resultados bastante satisfatórios no que concerne à capacidade de deteção de ataques e identificação de nós maliciosos, apresentando ainda um impacto energético perfeitamente admissível dado o domínio em que se aplica.
The present work approaches the problem associated with the incidence of Wormhole attacks in networks operated by the Routing Protocol for Low-Power and Lossy Networks (RPL). This type of attack typically assumes the existence of at least two malicious nodes in the topology that maintain a private connection used to broadcast legitimate packets. This practice motivates nodes that are in the vicinity of the infected nodes to mistakenly assume distant nodes as their neighbours. The energy and computational limitations of Internet of Things (IoT) devices and the vast application domain where they are used, motivate the development of strategies that promote the safety of this technology. Following this, a hybrid Intrusion Detection System (IDS), based on signatures, aimed at identifying Wormhole attacks in this type of environment was proposed. The detection strategy involves the relationship of the distance travelled by the packets, between the sender and recipient nodes, with the distance taken as a reference for this path. The operationalization of this model presupposes the prior determination of the distance between neighbouring nodes, and the inclusion of new fields in the packets in transit. The proposed IDS was evaluated using simulation with the Cooja tool and showed very satisfactory results in terms of the ability to detect attacks and identify malicious nodes. Regarding the energy impact of the solution, it was perfectly acceptable given the domain in which it applies.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Bing-Jung, and 李秉峻. "A Communication Protocol for Prevention of Wormhole Attacks Based on Wireless Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/du3dde.

Full text
Abstract:
碩士
國立中正大學
資訊管理系研究所
104
Information security is very important today, everyone is easy to been attack by a malicious attacker to steal data, even disguised fake information to anyone; wherein in a wireless network environment, due to the characteristics of the mobile node to make mobile devices more easily to been attack by malicious people when establish a connection . As the development of smart phones, the ratio of people who rely on mobile devices to surf of Internet are increasing, when the malicious attacks make more damage; In so many attacks in wireless network ,wormhole attack is the most difficult to prevent and detect, and once there wormholes exist and attack the network , the attacker can easily paralyze the Internet, tapping Information, forged information, very easy to be able to have a significant impact on the network. In our research will focus on the wormhole attack, we carried out a three-stage process when the node establish a connection and transmit the information: preparation phase, trading phase and release phase of operation. With our three stages, we not only achieve the goal to prevention of unauthorized malicious attackers to attack, but also to avoid the interior malicious attacker who has authorized cannot easily get the message contents, when a new node is add , it can quickly to know the secure connection topology.
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Bang-Jheng, and 劉邦正. "An Intrusion Prevention Scheme for Wormhole Attacks in Mobile Ad Hoc Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/10569044017789253921.

Full text
Abstract:
碩士
大葉大學
資訊管理學系碩士班
96
In recent years, wireless ad hoc networks is an increasingly popular topic. It is a node-to-node transmission model. The nodes communicate with each other via wireless ad hoc networks technology, and thus form wireless local area networks. Nowadays, some literature points out that this kind of framework encounters lots of security threats, such as location disclosure, routing table poisoning, wormhole attack and so on. However, the wormhole attack is a more serious threat among them because most secure route mechanisms can not effectively avoid it. This kind of attack gets better transmission parameters than normal route does by quicker transmission through two malicious nodes. And then it controls the route operation under some sections of environment in order to devastate or steal confidential information. Although at present many scholars proposed that wormhole attacks can be detected by intrusion detection systems, most detection mechanisms still rely on special hardware, consume enormous system resources or need to make propose some assumptions which are not under wireless conditions. Consequently, in this thesis, we design an intrusion prevention scheme which needs only low system resources in mobile ad hoc networks to avoid the wormhole attack effectively.
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Wei-Ming, and 王偉民. "An auto-resilient routing protocol against wormhole attacks in Mobile Ad-hoc network." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/73904599196290623614.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
97
The Mobile Ad-hoc networks (MANETs) are self-configuring network and each node in MANETs is free to move and has the ability to route packets. However, these characteristics will give rise to Wormhole attack which will increase the influences of network attacks. In recent years, the methods how to avoid wormhole attacks have become attractive research issues. However, many previous works focus on observing the behavior of wormhole node to solve the attack issues. We thought against wormhole attack utilizing the routing characteristics of MANETs will has the better resulting of avoiding attacks. We researched the routing protocol of MANETs, present the wormhole attacks using the weakness of routing protocols and we will propose a robust routing protocol to solve the wormhole attacks.
APA, Harvard, Vancouver, ISO, and other styles
17

Jen, Shang-Ming, and 任上鳴. "Defending Wormhole Attacks in Wireless Ad Hoc Networks: An Efficient Routing Mechanism with Hop Count Analysis." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/53415195476120803432.

Full text
Abstract:
碩士
國立成功大學
電腦與通信工程研究所
95
The wireless ad-hoc network is a kind of newly risen network system. With the ability of self-organization, nodes in the network can automatically form a communication system without infrastructure. However, there are serious security issues in this kind of network due to its wireless transmissions. For example, eavesdrop, modification and Denial of Service (DoS), and so on, are some common attacks. The attackers usually have to use some angles to take the right of routing in order to launch these attacks. The wormhole attack is an effective angle. The routes which go through a wormhole tunnel formed by attackers may have better transmission parameters than normal ones, so that malicious nodes can easily have the right of routing. Until now, many researches against this problem have been proposed. For examples, Wang et al. constructed a visualization system; Hu et al. presented a method of packet leashes; and Lazos et al. gave a graph theory approach, etc. Most of these works detect wormhole from the viewpoint of administrators. Some special hardware or enormous computations are needed for finding the wormhole in most of these methods. Besides, they usually depend on some impractical assumptions of network environment. In this paper, we propose an efficient mechanism, the HCA routing protocol, from users’ viewpoint to avoid some routes which are obviously unsafe. We analyze the hop count values in the route reply (RREP) packets and do not have to confirm the existence of the wormhole. We verify the performance through three experiments and conclude that we can successfully avoid most of the wormhole without any hardware supported. In addition, our HCA protocol does not need any environment assumptions and can be directly adapted in the mobile ad-hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
18

DING, WEI-JIUN, and 丁偉峻. "A Wormhole Attacks Detection in WSN Using Multiple Moving Averages based on Quantum-inspired Tabu Search Algorithm and Sliding Window." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/t2p4zf.

Full text
Abstract:
碩士
國立暨南國際大學
資訊工程學系
106
Wormhole attack problem is one of the important security issues in the wireless sensing network(WSN), which may shorten the life of the sensor and damage the structure of the entire network topology. The method of the physical device, or the use of node information to construct the network topology, we have improved the method of using the neighbor information collected by the mobile node, and combined with moving average(MA) and the quantum-inspired tabu search algorithm(QTS) to detect wormhole attacks. However, we use the characteristics of the mobile model to propose a method that uses less resources but still effectively detects wormhole attacks. . In this paper, we have improved the use of mobile nodes to collect neighbor information without the need for additional hardware devices, complex calculations and large resource consumption methods, using moving average(MA) and quantum -inspired tabu search algorithm to find rules and detect wormhole attacks. However, we use the characteristics of the moving model to detect when the node moves. And the signal leaving the wormhole, the final experimental results show that the method has superior performance and low resource utilization, but can still effectively detect wormholes with different node densities and transmission distances.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography