Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
Title | Graph-based wormhole attack detection in mobile ad hoc networks (MANETs) |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Mammeri, A. |
Conference Name | 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) |
Keywords | Communication system security, composability, end-nodes, Extremities, graph theory, malicious nodes, MANET, MANET Attack Detection, Metrics, mobile ad hoc networks, mobile computing, network level, pubcrawl, Resiliency, Routing, telecommunication network routing, telecommunication security, Wireless communication, wireless medium, wormhole attack detection, Wormhole tunnel |
Abstract | A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it. |
URL | https://ieeexplore.ieee.org/document/8311439 |
DOI | 10.1109/MOBISECSERV.2018.8311439 |
Citation Key | rmayti_graph-based_2018 |
- mobile computing
- Wormhole tunnel
- wormhole attack detection
- wireless medium
- Wireless communication
- telecommunication security
- telecommunication network routing
- Routing
- Resiliency
- pubcrawl
- network level
- Communication system security
- mobile ad hoc networks
- Metrics
- MANET Attack Detection
- MANET
- malicious nodes
- graph theory
- Extremities
- end-nodes
- composability