Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

A Detecting and Defending Method of Wormhole Attack Based on Time Ruler

Authors
Lv Guoyuan, Wang Yiming, Zhu Canyan, Chen Rong, Wang Lujie
Corresponding Author
Lv Guoyuan
Available Online November 2013.
DOI
10.2991/ccis-13.2013.16How to use a DOI?
Keywords
Ad Hoc networks; wormhole attack; attack detection; Time Ruler
Abstract

Wormhole attack is a severe attack in mobile ad hoc networks, which is particularly challenging to defend against. In this paper, a new method defined as time ruler using distance measurement for detecting wormhole attack is proposed including its hypothetical model, the concept of time ruler and the process of its establishment, storage and calibration. The feasibility of the method on theory, thus respectively deriving two discriminating inequalities with the use of sending time ruler and receiving time ruler are analyzed in detail. The performances of the method are also analyzed and its validity is evaluated with Omnet++ developing tools.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
978-90-78677-88-8
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.16How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Lv Guoyuan
AU  - Wang Yiming
AU  - Zhu Canyan
AU  - Chen Rong
AU  - Wang Lujie
PY  - 2013/11
DA  - 2013/11
TI  - A Detecting and Defending Method of Wormhole Attack Based on Time Ruler
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 65
EP  - 68
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.16
DO  - 10.2991/ccis-13.2013.16
ID  - Guoyuan2013/11
ER  -