@inproceedings{01c2bf56ca3a42339bb581569eef74d5,
title = "WODEM: Wormhole attack defense mechanism in wireless sensor networks",
abstract = "The wormhole attack, which is accomplished by selectively relaying packets between two adversaries, can ruin routing and communication of the network without compromising any legitimate nodes. There have been a few countermeasures against the wormhole attack in generic ad hoc networks, but they are not appropriate for sensor networks since they require special devices (e.g. directional antenna) or put much overhead on each node. In this paper, we propose a new countermeasure against the wormhole attack for sensor networks, named WODEM. In WODEM, a few detector nodes equipped with location-aware devices and longer-lasting batteries detect wormholes, and normal sensor nodes are only required to forward control packets from the detector nodes. Therefore, WODEM is efficient in cost and energy. From the simulation results, we show that 10 detector nodes can detect a wormhole within the accuracy of 90\% in a densely deployed sensor network.",
keywords = "Security, Sensor network, Wormhole attack",
author = "Yun, \{Ji Hoon\} and Kim, \{Il Hwan\} and Lim, \{Jae Han\} and Seo, \{Seung Woo\}",
year = "2007",
doi = "10.1007/978-3-540-71789-8\_21",
language = "English",
isbn = "9783540717881",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "200--209",
booktitle = "Ubiquitous Convergence Technology - First International Conference, ICUCT 2006, Revised Selected Papers",
note = "1st International Conference on Ubiquitous Convergence Technology, ICUCT 2006 ; Conference date: 05-12-2006 Through 06-12-2006",
}