Loading...
Please wait, while we are loading the content...
Similar Documents
Secure Neighbor Verification Protocol in Wireless Mesh Networks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Subhash, Parimalla |
| Copyright Year | 2015 |
| Abstract | The main motivation of an attacker is to convince two far away nodes as neighbor nodes using wormhole attack easily without the knowledge of cryptographic primitives. Thus, it can significantly degrade the performance of Wireless Mesh Networks (WMNs). Secure neighbor discovery is a fundamental requirement of network nodes to ensure secure data communication. An adversary that bypass neighbor discovery process of a legitimate node using wormhole attack can disrupt the overlying protocols and applications. In this paper, we propose a secure neighbor verification mechanism to thwart wormhole attack that can prevent bogus links from being involved in the network operations. It employs node ranking scheme to compute relative distance between neighbors and uses connectivity information to check the genuinity of neighborhood creation. We evaluate our mechanism using simulation to demonstrate the efficiency in the presence of wormholes. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.jatit.org/volumes/Vol82No2/13Vol82No2.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |