• DocumentCode
    2937020
  • Title

    Interactive Wormhole Detection in Large Scale Wireless Networks

  • Author

    Wang, Weichao ; Lu, Aidong

  • Author_Institution
    Kansas Univ.
  • fYear
    2006
  • fDate
    Oct. 31 2006-Nov. 2 2006
  • Firstpage
    99
  • Lastpage
    106
  • Abstract
    Wormhole attacks in wireless networks can severely deteriorate the network performance and compromise the security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple worm-hole attackers. Various visual forms have been adopted to assist the understanding and analysis of the reconstructed network topology and improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. The proposed approach demonstrates that interactive visualization can be successfully combined with network security mechanisms to greatly improve the intrusion detection capabilities
  • Keywords
    data visualisation; radio networks; security of data; telecommunication security; automatic detection algorithm; interactive visualization of wormholes; interactive wormhole detection; intrusion detection; large scale wireless network; network topology visualization; routing protocol; user interaction; Communication system security; Detection algorithms; Hardware; Information security; Large-scale systems; Monitoring; Network topology; Routing protocols; Visualization; Wireless networks; C.2.0 [Computer-Communication Networks]: General¿Security and protection; H.5.2 [Information Systems]: Information Interfaces and Presentation¿User interfaces; Interactive Detection; Topology Visualization; Visualization on Network Security; Wireless Networks; Wormhole Attacks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Visual Analytics Science And Technology, 2006 IEEE Symposium On
  • Conference_Location
    Baltimore, MD
  • Print_ISBN
    1-4244-0591-2
  • Electronic_ISBN
    1-4244-0592-0
  • Type

    conf

  • DOI
    10.1109/VAST.2006.261435
  • Filename
    4035753