
destination and nodes in its routing table also having
routes to the destination. In addition to preventing
the wormhole attack, those solutions have the
privilege of providing a load balance in the ad hoc
networks, such as to save regular nodes from
resource consumption if they repeatedly participate
in routing. We plan to verify those schemes, while
comparing its performance to other wormhole
prevention schemes proposed in the literature. In
addition, the cost function can include extra
calculations to take the number of hops offered by a
path into account such as to have the minimum path
cost and hop count together.
REFERENCES
Perkins, C., Royer, E., 2000. The Ad hoc On-Demand
Distance Vector Protocol. In C. E. Perkins, editor, Ad
hoc Networking, Addison-Wesley, pp. 173-219.
Karlof C., Wagner,D., 2003.Secure Routing in Sensor
Networks: Attacks and Countermeasures. In the 1st
IEEE International Workshop on Sensor Network
Protocols and Applications, May, 2003.
Hu, Y., Perrig, A., Johnson, D.,2003. Packet leashes: a
defense against wormhole attacks in wireless
networks. In Proceedings of the 22nd Annual Joint
Conference of the IEEE Computer and
Communications Societies (INFOCOM), pp. 1976-
1986.
Hu, L., Evans, D., 2004. Using Directional Antennas to
Prevent Wormhole Attacks, In Network and
Distributed System Security Symposium (NDSS).
Khalil,I., Bagchi, S., Shroff, N., 2005. LITEWORP: A
Lightweight Countermeasure for the Wormhole Attack
in Multihop Wireless Networks. In 2005 International
Conference on Dependable Systems and Networks
(DSN'05), pp. 612-621.
Choi, S., Kim, D., Lee, D., Jung, J., 2008. WAP:
Wormhole Attack Prevention Algorithm in Mobile Ad
Hoc Networks. In Sensor Networks, Ubiquitous and
Trustworthy Computing 2008 SUTC '08. IEEE
International Conference on, vol., no., pp.343-348.
Khurana, S., Gupta, N., 2008. FEEPVR: First End-to-End
Protocol to Secure Ad Hoc Networks with Variable
Ranges against Wormhole Attacks. In securware 2008
Second International Conference on Emerging
Security Information, Systems and Technologies,
pp.74-79.
Wang, X., 2006. Intrusion Detection Techniques in
Wireless Ad Hoc Networks. In 30th Annual
International Computer Software and Applications
Conference (COMPSAC'06), pp. 347-349, 2006.
Wang, X., Wong, J., 2007. An End-to-end Detection of
Wormhole Attack in Wireless Ad-hoc Networks. In
31st Annual International Computer Software and
Applications Conference - Vol. 1- (COMPSAC 2007),
pp. 39-48.
Zhang, Y., Liu, W., Lou, W., and Fang, Y, 2005. Securing
sensor networks with location-based keys. In WCNC
2005, IEEE Wireless Communications and
Networking Conference, no. 1, pp. 1909 – 1914.
Poovendran, R., Lazos, L., 2007. A graph theoretic
framework for preventing the wormhole attack. In
wireless ad hoc networks, Volume 13, Issue 1, ISSN:
1022-0038, pp. 27 – 59, 2007.
Song,N., Qian, L., Li, X., 2005. Wormhole Attacks
Detection in Wireless Ad Hoc Networks: A Statistical
Analysis Approach. In 19th IEEE International
Parallel and Distributed Processing Symposium
(IPDPS'05) - Workshop 17.
Buttyan, L., Dora, L., Vajda, I., 2005. Statistical wormhole
detection in sensor networks. In Hungary, July 2005.
Maheshwari, r., Gao, J., Das, S., 2007 Detecting
Wormhole Attacks in Wireless Networks Using
Connectivity Information, In INFOCOM 2007, 26th
IEEE International Conference on Computer
Communications, IEEE (2007), pp. 107-115.
Wang, W., Bhargava, B., 2004. Visulization of wormholes
in sensor networks. In Proceeding of the
ACMWorkshop onWireless Security (WiSe), pp. 51–
60, 2004.
Azer, M., El-Kassas, S., El-Soudani, M., 2006. Using
Attack Graphs in Ad Hoc Networks for Intrusion
Prediction Correlation and Detection. In SECRYPT
2006, pp. 63-68.
Win, K., 2008. Analysis of Detecting Wormhole Attack in
Wireless Networks. In Proceedings of world Academy
of Science, Engineering and Technology Volume 36
December 2008 ISSN 2070-3740.
Kong, F., Li, C., Ding, Q., Cui, G., and Cui, B., 2009.
WAPN: A Distributed Wormhole Attack Detection
Approach for Wireless Sensor Networks. In Journal of
Zhejiang University SCIENCE A, vol. 10, pp.
279~289, February 2009.
Gunhee, L., Jungtaek, S., and Dong-kyoo, K., 2008. An
Approach to Mitigate Wormhole Attack in Wireless
Ad Hoc Networks," in Proceedings of the 2008
International Conference on Information Security and
Assurance (ISA 2008), pp. 220-225.
SECRYPT 2009 - International Conference on Security and Cryptography
74