DocumentCode
2937020
Title
Interactive Wormhole Detection in Large Scale Wireless Networks
Author
Wang, Weichao ; Lu, Aidong
Author_Institution
Kansas Univ.
fYear
2006
fDate
Oct. 31 2006-Nov. 2 2006
Firstpage
99
Lastpage
106
Abstract
Wormhole attacks in wireless networks can severely deteriorate the network performance and compromise the security through spoiling the routing protocols and weakening the security enhancements. This paper develops an approach, interactive visualization of wormholes (IVoW), to monitor and detect such attacks in large scale wireless networks in real time. We characterize the topology features of a network under wormhole attacks through the node position changes and visualize the information at dynamically adjusted scales. We integrate an automatic detection algorithm with appropriate user interactions to handle complicated scenarios that include a large number of moving nodes and multiple worm-hole attackers. Various visual forms have been adopted to assist the understanding and analysis of the reconstructed network topology and improve the detection accuracy. Extended simulation has demonstrated that the proposed approach can effectively locate the fake neighbor connections without introducing many false alarms. IVoW does not require the wireless nodes to be equipped with any special hardware, thus avoiding any additional cost. The proposed approach demonstrates that interactive visualization can be successfully combined with network security mechanisms to greatly improve the intrusion detection capabilities
Keywords
data visualisation; radio networks; security of data; telecommunication security; automatic detection algorithm; interactive visualization of wormholes; interactive wormhole detection; intrusion detection; large scale wireless network; network topology visualization; routing protocol; user interaction; Communication system security; Detection algorithms; Hardware; Information security; Large-scale systems; Monitoring; Network topology; Routing protocols; Visualization; Wireless networks; C.2.0 [Computer-Communication Networks]: General¿Security and protection; H.5.2 [Information Systems]: Information Interfaces and Presentation¿User interfaces; Interactive Detection; Topology Visualization; Visualization on Network Security; Wireless Networks; Wormhole Attacks;
fLanguage
English
Publisher
ieee
Conference_Titel
Visual Analytics Science And Technology, 2006 IEEE Symposium On
Conference_Location
Baltimore, MD
Print_ISBN
1-4244-0591-2
Electronic_ISBN
1-4244-0592-0
Type
conf
DOI
10.1109/VAST.2006.261435
Filename
4035753
Link To Document