Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30174
Wormhole Attack Detection in Wireless Sensor Networks

Authors: Zaw Tun, Aung Htein Maw

Abstract:

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending mechanism and then proposes round trip time (RTT) and neighbor numbers based wormhole detection mechanism. The consideration of proposed mechanism is the RTT between two successive nodes and those nodes- neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. This system does not require any specific hardware, has good performance and little overhead and also does not consume extra energy. The proposed system is designed in ad hoc on-demand distance vector (AODV) routing protocol and analysis and simulations of the proposed system are performed in network simulator (ns-2).

Keywords: AODV, Wormhole attacks, Wireless ad hoc andsensor networks

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1070121

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3123

References:


[1] I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on Sensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.
[2] L. Buttyán, L. Dóra, I. Vajda, Statistical Wormhole Detection in Sensor Networks, Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14, 2005,pp. 128-141
[3] S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
[4] C. Karlof and D. Wanger. Secure Routing in Sensor Networks: Attacks and Counter-measures. In Proceedings of the 1st IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK, May, 2003, pp.113-127.
[5] J. C. Hou and N. Li, Topology Construction and Maintenance in Wireless Sensor Networks, Book Chapter of Handbook of Sensor Networks: Algorithms and Architectures, John Wiley & Sons, Inc. 2005
[6] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Proceedings of the IEEE Symposium on Network and Distributed System Security (NDSS), 2004.
[7] Y. Hu, A. Perring, and D.B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In Proceedings of 22nd Annual Conference of the IEEE Computer and Commu-nication Societies, Vol.3, April 2003. pp.1976-1986.
[8] I. Khalil, S. Bagchi, and N.B. Shroff. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In proceeding of International Conference on Dependable Systems and Networks (DSN 2005), Yokohama, Japan.
[9] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang. Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph Theoretic Approach. In Proceedings of Wireless Communictions and Networking Conference, 2005.IEEE. March 2005. pp.1193-1199.
[10] A. A. Pirzada, and C. McDonald. Circumventing Sinkholes and Wormholes in Wireless Sensor Networks. International Work-shop on Wireless Ad Hoc networks, 2005(5):pp. 132-150.
[11] L. Qian, N. Song, and X. Li, Detecting and locating wormhole attacks in Wireless Ad Hoc Networks through statistical analysis of multi-path, IEEE Wireless Communications and Networking Conference - WCNC 2005.
[12] W. Sharif and C. Leckie. New Variants of Wormhole Attacks for Sensor Networks. In the proceeding of the Australian Telecommunication Networks and Applications Conference, Melbourne Austrila, December 2006, pp.288-292.
[13] N. Song, L. Qian, and X. Li. Wormhole Attacks Detections in Wireless Ad Hoc Networks: A Statistical Analysis Approach. In Proceeding of the 19th International Parallel and Distributed Processing Symposium (IPDPS-05)
[14] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. N. Levitt. A specification-based intrusion detection system for AODV. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03)
[15] W. Wang and B. Bhargava. Visualization of Wormholes in Sensor Networks. In Proceedings of the ACM workshop on Wireless security (Wise-04), 2004. pp. 51-60.
[16] W. Wang, B. Bhargava, Y. Lu and X. Wu, Defending Against Wormhole Attacks in Mobile Ad Hoc Networks, Wireless Communication and Mobile Computing, Volume 6, Issue:4, June 2006, pp.483-503.