Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks

2010 ◽  
Vol 17 (5) ◽  
pp. 36-42 ◽  
Author(s):  
Yanzhi Ren ◽  
Mooi Chuah ◽  
Jie Yang ◽  
Yingying Chen
2010 ◽  
pp. 1473-1487
Author(s):  
Qunwei Zheng ◽  
Xiaoyan Hong ◽  
Jun Liu ◽  
Lei Tang

A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, we propose a novel time-based approach that exploits mobility. In our scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks. The article focuses on analyzing the feasibility of this scheme. We describe a general approach to calculate the probability of intercepting enough shares by arbitrary nodes, together with simulations. The results show that the probability is small. The scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.


Author(s):  
Eranda Harshanath Jayatunga ◽  
Pasika Sashmal Ranaweera ◽  
Indika Anuradha Mendis Balapuwaduge

The internet of things (IoT) is paving a path for connecting a plethora of smart devices together that emerges from the novel 5G-based applications. This evident heterogeneity invites the integration of diverse technologies such as wireless sensor networks (WSNs), software-defined networks (SDNs), cognitive radio networks (CRNs), delay tolerant networks (DTNs), and opportunistic networks (oppnets). However, the security and privacy are prominent conundrums due to featured compatibility and interoperability aspects of evolving directives. Blockchain is the most nascent paradigm instituted to resolve the issues of security and privacy while retaining performance standards. In this chapter, advances of blockchain technology in aforesaid networks are investigated and presented as means to be followed as security practices for pragmatically realizing the concepts.


Author(s):  
Qunwei Zheng ◽  
Xiaoyan Hong ◽  
Jun Liu ◽  
Lei Tang

A multi-hop wireless network with highly dynamic members and mobility is vulnerable to many attacks. To address this problem, we propose a novel time-based approach that exploits mobility. In our scheme, the source sends shares at different times. Due to node mobility, these shares will be routed through different intermediate nodes. It is highly unlikely that a particular intermediate node is able to be on many of these routes and to collect enough shares to reconstruct the original message. The scheme is particularly suitable for applications that can tolerate long message delays, as studied in Delay Tolerant Networks. The article focuses on analyzing the feasibility of this scheme. We describe a general approach to calculate the probability of intercepting enough shares by arbitrary nodes, together with simulations. The results show that the probability is small. The scheme provides a valuable alternative for delay tolerant applications to enhance message confidentiality.


2012 ◽  
Vol E95.B (9) ◽  
pp. 2769-2773 ◽  
Author(s):  
Xuanya LI ◽  
Linlin CI ◽  
Wenbing JIN

2009 ◽  
Vol E92-B (12) ◽  
pp. 3927-3930 ◽  
Author(s):  
Jeonggyu KIM ◽  
Jongmin SHIN ◽  
Dongmin YANG ◽  
Cheeha KIM

2019 ◽  
Vol E102.B (12) ◽  
pp. 2183-2198
Author(s):  
Dawei YAN ◽  
Cong LIU ◽  
Peng YOU ◽  
Shaowei YONG ◽  
Dongfang GUAN ◽  
...  

2012 ◽  
Vol E95.B (11) ◽  
pp. 3585-3589 ◽  
Author(s):  
Seok-Kap KO ◽  
Hakjeon BANG ◽  
Kyungran KANG ◽  
Chang-Soo PARK

Sign in / Sign up

Export Citation Format

Share Document