Detection method for wormhole attacks in Ad Hoc network

The invention relates to a wireless network security technology and discloses a detection method for wormhole attacks in an Ad Hoc network. When a node transmits or receives a routing message, time ruler information (Ruler: T0, Gt and delta T) is set up in the routing message, wherein the T0 is init...

Full description

Saved in:
Bibliographic Details
Main Authors WANG YIMING, LV GUOYUAN
Format Patent
LanguageChinese
English
Published 04.04.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention relates to a wireless network security technology and discloses a detection method for wormhole attacks in an Ad Hoc network. When a node transmits or receives a routing message, time ruler information (Ruler: T0, Gt and delta T) is set up in the routing message, wherein the T0 is initial time when the node sets up the time ruler information, the delta T is an allowable time range for the node to transmit information, the Gt is the minimal time interval of the node to continuously transmit route packages to an adjacent node of the node twice; the node sets up and stores the neighbor lists of all nodes adjacent to the node, and receives time ruler calibration marks and neighbor validity marks, and the element items in the lists are the time ruler information (Ruler: T0, Gt and deltaT) of the adjacent nodes. As the dissemination speed of the message between two nodes is determined, the length of a one-hop link through which some message passes can be measured through measuring the dissemination ti
Bibliography:Application Number: CN201110288362