{"title":"移动自组织网络组播路由协议中的蠕虫洞攻击防范","authors":"E. Anita, V. Bai, E. Raj, B. Prabhu","doi":"10.1109/WIRELESSVITAE.2011.5940921","DOIUrl":null,"url":null,"abstract":"Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. Our focus in this paper is to analyze the performance of reactive multicast routing protocol On Demand Multicast Routing Protocol (ODMRP) under the influence of worm hole nodes under different scenarios and design a Worm Hole Secure ODMRP (WHS-ODMRP) by applying certificate based authentication mechanism in the route discovery process. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":"52 1","pages":"1-5"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/WIRELESSVITAE.2011.5940921","citationCount":"19","resultStr":"{\"title\":\"Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks\",\"authors\":\"E. Anita, V. Bai, E. Raj, B. Prabhu\",\"doi\":\"10.1109/WIRELESSVITAE.2011.5940921\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. Our focus in this paper is to analyze the performance of reactive multicast routing protocol On Demand Multicast Routing Protocol (ODMRP) under the influence of worm hole nodes under different scenarios and design a Worm Hole Secure ODMRP (WHS-ODMRP) by applying certificate based authentication mechanism in the route discovery process. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance.\",\"PeriodicalId\":68078,\"journal\":{\"name\":\"无线互联科技\",\"volume\":\"52 1\",\"pages\":\"1-5\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.1109/WIRELESSVITAE.2011.5940921\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"无线互联科技\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/WIRELESSVITAE.2011.5940921\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"无线互联科技","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940921","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks
Security issues are paramount in wireless networks even more so than in wired networks. A particularly devastating attack in wireless networks is the wormhole attack, where two or more malicious colluding nodes create a higher level virtual tunnel in the network, which is employed to transport packets between the tunnel end points. These tunnels emulate shorter links in the network in which adversary records transmitted packets at one location in the network, tunnels them to another location, and retransmits them into the network. Our focus in this paper is to analyze the performance of reactive multicast routing protocol On Demand Multicast Routing Protocol (ODMRP) under the influence of worm hole nodes under different scenarios and design a Worm Hole Secure ODMRP (WHS-ODMRP) by applying certificate based authentication mechanism in the route discovery process. The proposed protocol reduces the packet loss due to malicious nodes to a considerable extent thereby enhancing the performance.