Advertisement

Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks

  • Tassos Dimitriou
  • Athanassios Giannetsos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6131)

Abstract

A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful for real-world scenarios. Most importantly, however, the algorithm can always prevent wormholes, irrespective of the density of the network, while its efficiency is not affected even by frequent connectivity changes. We also provide an analytical evaluation of the algorithm’s correctness along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.

Keywords

Wormhole attack Sensor Networks Ad hoc networks  Computer network security Tunnelling Connectivity Information Path Existence 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor networks: a survey. Mobile Computing and Communications Review 9(2), 4–18 (2005)CrossRefGoogle Scholar
  2. 2.
    Buttyán, L., Dóra, L., Vajda, I.: Statistical wormhole detection in sensor networks, pp. 128–141 (2005)Google Scholar
  3. 3.
    Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack in wireless networks, pp. 75–84 (2006)Google Scholar
  4. 4.
    Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: NCA 2008: Proceedings of the 2008 Seventh IEEE International Symposium on Network Computing and Applications, Washington, DC, USA, pp. 325–331. IEEE Computer Society, Los Alamitos (2008)CrossRefGoogle Scholar
  5. 5.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)CrossRefGoogle Scholar
  6. 6.
    Issa Khalil, N.B.S., Bagchi, S.: Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks, p. 22 (June 2005)Google Scholar
  7. 7.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks Journal 1(2-3), 293–315 (2003)CrossRefGoogle Scholar
  8. 8.
    Korkmaz, T.: Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. In: ITCC 2005: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), Washington, DC, USA, vol. II, pp. 704–709. IEEE Computer Society, Los Alamitos (2005)CrossRefGoogle Scholar
  9. 9.
    Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F., Dimitriou, T.: Cooperative intrusion detection in wsn. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: SecPriWiMob 2008: First International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, Avignon, France, October 12-14 (2008)Google Scholar
  11. 11.
    Lehsaini, M., Guyennet, H., Feham, M.: A-coverage scheme for wireless sensor networks. In: ICWMC 2008: Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, Washington, DC, USA, pp. 91–96. IEEE Computer Society, Los Alamitos (2008)CrossRefGoogle Scholar
  12. 12.
    Lehsaini, M., Guyennet, H., Feham, M.: CES: Cluster-based energy-efficient scheme for mobile wireless sensor networks. In: IFIP Conference on Wireless Sensor and Actor Networks, Ontario, Canada (July 2008)Google Scholar
  13. 13.
    Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 107–115. IEEE, Los Alamitos (2007)CrossRefGoogle Scholar
  14. 14.
    Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks 13(1), 27–59 (2007)CrossRefGoogle Scholar
  15. 15.
    Capkun, S.S., Buttyan, L., Hubaux, J.-P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM Press, New York (2003)CrossRefGoogle Scholar
  16. 16.
    Savvides, A., Han, C.-C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 166–179. ACM Press, New York (2001)CrossRefGoogle Scholar
  17. 17.
    Bhargava, B., Wang, W.: Visualization of wormholes in sensor networks. In: Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom (October 2004)Google Scholar
  18. 18.
    Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks: Research articles. Wirel. Commun. Mob. Comput. 6(4), 483–503 (2006)CrossRefGoogle Scholar
  19. 19.
    Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6(1), 3–17 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Tassos Dimitriou
    • 1
  • Athanassios Giannetsos
    • 1
  1. 1.Athens Information TechnologyAthensGreece

Personalised recommendations