TY - GEN
T1 - Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)
AU - Rmayti, M.
AU - Begriche, Y.
AU - Khatoun, R.
AU - Khoukhi, L.
AU - Mammeri, A.
N1 - Publisher Copyright:
© 2018 IEEE.
PY - 2018/3/9
Y1 - 2018/3/9
N2 - A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.
AB - A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.
U2 - 10.1109/MOBISECSERV.2018.8311439
DO - 10.1109/MOBISECSERV.2018.8311439
M3 - Conference contribution
AN - SCOPUS:85050805937
T3 - 2018 4th International Conference on Mobile and Secure Services, MOBISECSERV 2018
SP - 1
EP - 6
BT - 2018 4th International Conference on Mobile and Secure Services, MOBISECSERV 2018
A2 - Urien, Pascal
A2 - Piramuthu, Selwyn
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Mobile and Secure Services, MOBISECSERV 2018
Y2 - 24 February 2018 through 25 February 2018
ER -