Detecting Wormhole Attacks in Wireless Sensor Networks
Purchase on Springer.com
$29.95 / €24.95 / £19.95*
* Final gross prices may vary according to local VAT.
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, the algorithm uses a hop counting technique as a probe procedure, reconstructs local maps for each node, and then uses a “diameter” feature to detect abnormalities caused by wormholes. The main advantage of the algorithm is that it provides the locations of wormholes, which is useful for implementing countermeasures. Simulation results show that the algorithm has low false detection and false toleration rates.
Keywords: Wireless sensor networks, wormhole detection, distributed algorithm
- I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, A survey of sensor networks, IEEE Communications, vol. 40(8), pp. 102-114, 2002. CrossRef
- S. Čapkun, L. Buttyán and J. Hubaux, SECTOR: Secure tracking of node encounters in multi-hop wireless networks, Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.
- W. Du, L. Fang and P. Ning, LAD: Localization anomaly detection for wireless sensor networks, Journal of Parallel and Distributed Computing, vol. 66(7), pp. 874-886, 2006. CrossRef
- L. Hu and D. Evans, Using directional antennas to prevent wormhole at- tacks, Proceedings of the Eleventh Network and Distributed System Security Symposium, pp. 131-141, 2004.
- Y. Hu, A. Perrig and D. Johnson, Wormhole Detection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, Houston, Texas, 2002.
- Y. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986, 2003.
- J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia and B. Bhargava, Low- cost attacks against packet delivery, localization and time synchronization services in underwater sensor networks, Proceedings of the Fourth ACM Workshop on Wireless Security, pp. 87-96, 2005.
- L. Lazos and R. Poovendran, SeRLoc: Robust localization for wireless sensor networks, ACM Transactions on Sensor Networks, vol. 1(1), pp. 73-100, 2005. CrossRef
- D. Liu, P. Ning and W. Du, Attack-resistant location estimation in sensor networks, Proceedings of the Fourth International Symposium on Informa- tion Processing in Sensor Networks, pp. 99-106, 2005.
- S. McCanne and S. Floyd, The network simulator -ns-2 (nsnam. isi. edu/nsnam/index. php/User Information), 2007.
- J. Newsome, E. Shi, D. Song and A. Perrig, The sybil attack in sensor networks: Analysis and defenses, Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
- P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
- R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Networks, vol. 13(1), pp. 27-59, 2007. CrossRef
- The Rice Monarch Project, Wireless and mobility extensions to ns-2 (www.monarch. cs. cmu. edu/cmu-ns. html), 2007.
- M. Vieira, C. Coelho Jr., D. da Silva Jr. and J. da Mata, Survey of wireless sensor network devices, Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 537-544, 2003.
- W. Wang and B. Bhargava, Visualization of wormholes in sensor networks, Proceedings of the ACM Workshop on Wireless Security, pp. 51-60, 2004.
- A. Wood and J. Stankovic, Denial of service in sensor networks, IEEE Computer, vol. 35(10), pp. 54-62, 2002.
- Y. Xu, J. Ford and F. Makedon, A variation on hop counting for geographic routing, Proceedings of the Third IEEE Workshop on Embedded Networked Sensors, 2006.
- J. Zheng, Low rate wireless personal area networks: ns-2 simulator for 802. 15. 4 (release v1. 1) (ees2cy. engr. ccny. cuny. edu/zheng/pub), 2007.
- Detecting Wormhole Attacks in Wireless Sensor Networks
- Book Title
- Critical Infrastructure Protection
- Book Part
- PART IV
- pp 267-279
- Print ISBN
- Online ISBN
- Series Title
- IFIP International Federation for Information Processing
- Series Volume
- Series ISSN
- Springer US
- Copyright Holder
- Springer-Verlag US
- Additional Links
- Industry Sectors
- eBook Packages
- Editor Affiliations
- 1. Dartmouth College
- 2. University of Tulsa
- Author Affiliations
- 3. Dartmouth College, Hanover, NH, USA
- 4. Computer Science, University of Massachusetts-Lowell, Lowell, MA, USA
- 5. Computer Science and Engineering, University of Texas at Arlington, Arlington, TX, USA
To view the rest of this content please follow the download PDF link above.