Publication | Closed Access
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
131
Citations
12
References
2005
Year
Unknown Venue
Wireless RoutingEngineeringLocal Broadcast KeysInformation SecurityNetwork AnalysisWormhole AttacksWireless SecurityAd Hoc NetworkWormhole AttackSecure CommunicationRegular Communication ChannelRouting ProtocolNetwork SecurityComputer ScienceData SecurityCryptographyGraph TheoryGraph Theoretic ApproachSecure Routing
We study the problem of characterizing the wormhole attack, an attack that can be mounted on a wide range of wireless network protocols without compromising any cryptographic quantity or network node. A wormhole, in essence, creates a communication link between an origin and a destination point that could not exist with the use of the regular communication channel. Hence, a wormhole modifies the connectivity matrix of the network, and can be described by a graph abstraction of the ad hoc network. Making use of geometric random graphs induced by the communication range constraint of the nodes, we present the necessary and sufficient conditions for detecting and defending against wormholes. Using our theory, we also present a defense mechanism based on local broadcast keys. We believe our work is the first one to present analytical calculation of the probabilities of detection. We also present simulation results to illustrate our theory.
| Year | Citations | |
|---|---|---|
Page 1
Page 1