DocumentCode :
3541539
Title :
Modeling the Wormhole Attack in Underwater Sensor Network
Author :
Xiao Lu ; Zhu Yonghua
Author_Institution :
Sch. of Comput. Engeering & Sci., Shanghai Univ., Shanghai, China
fYear :
2012
fDate :
21-23 Sept. 2012
Firstpage :
1
Lastpage :
4
Abstract :
In underwater sensor network, security becomes a primary concern in order to provide protected communication. In this paper, we present a novel network simulation component, wormhole attack, in NS2, for underwater sensor networks, after analyzing the current methods of simulating wormhole attack. The core idea of wormhole implementation is making a "tunnel" between two malicious nodes. If this "tunnel" is built on normal wireless or wired channel, there would be some unexpected channel loss. So in order to solve the problem, we selected the existing wired object Link, in the NS2 wired simulation package, to simulate the "tunnel" by copying the local packets and directly sending them to the wormhole object installed in a remote node. Experimental results demonstrate the effectiveness of the wormhole components in NS2 worked smoothly and comply with the actual.
Keywords :
computer network security; distributed sensors; underwater acoustic communication; NS2 wired simulation package; local packets; malicious nodes; network simulation component; protected communication; remote node; tunnel; underwater sensor network security; wired object Link; wormhole attack; wormhole components; wormhole object; Ad hoc networks; Communication system security; Peer-to-peer computing; Routing protocols; Security; Wireless communication; Wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications, Networking and Mobile Computing (WiCOM), 2012 8th International Conference on
Conference_Location :
Shanghai
ISSN :
2161-9646
Print_ISBN :
978-1-61284-684-2
Type :
conf
DOI :
10.1109/WiCOM.2012.6478576
Filename :
6478576
Link To Document :
بازگشت