loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Marianne Amir Azer 1 ; Sherif Mohammed El-Kassas 2 and Mady Saiid El-Soudani 3

Affiliations: 1 Nile University, Egypt ; 2 American University in Cairo, Egypt ; 3 Cairo University, Egypt

Keyword(s): Ad Hoc networks, Attacks, Routing, Security, Wormhole attack.

Related Ontology Subjects/Areas/Topics: Information and Systems Security ; Network Security ; Sensor and Mobile Ad Hoc Network Security

Abstract: Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features, they are vulnerable to many attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper we explain the wormhole attack modes and propose two schemes for the wormhole attack prevention in ad hoc networks. The schemes rely on the idea that usually the wormhole nodes participate in the routing in a repeated way as they attract most of the traffic. Therefore, each node will be assigned a cost depending in its participation in routing. The cost function is chosen to be exponential in powers of two such that to rapidly increase the cost of already used nodes. Besides prevent ing the wormhole attack, these schemes provide a load balance among nodes to avoid exhausting a node that is always cooperative in routing. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.226.187.210

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Amir Azer, M.; Mohammed El-Kassas, S. and Saiid El-Soudani, M. (2009). PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES. In Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT; ISBN 978-989-674-005-4; ISSN 2184-3236, SciTePress, pages 69-74. DOI: 10.5220/0002178400690074

@conference{secrypt09,
author={Marianne {Amir Azer}. and Sherif {Mohammed El{-}Kassas}. and Mady {Saiid El{-}Soudani}.},
title={PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT},
year={2009},
pages={69-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002178400690074},
isbn={978-989-674-005-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2009) - SECRYPT
TI - PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
SN - 978-989-674-005-4
IS - 2184-3236
AU - Amir Azer, M.
AU - Mohammed El-Kassas, S.
AU - Saiid El-Soudani, M.
PY - 2009
SP - 69
EP - 74
DO - 10.5220/0002178400690074
PB - SciTePress