Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm

4Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.

Abstract

Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called δT Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the δT Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm. © 2013 by the authors; licensee MDPI, Basel, Switzerland.

Cite

CITATION STYLE

APA

Karlsson, J., Dooley, L. S., & Pulkkis, G. (2013). Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm. Sensors (Switzerland), 13(5), 6651–6668. https://doi.org/10.3390/s130506651

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free