Detecting Wormhole Attacks in Wireless Sensor Networks
Conference paper DOI:
253 of the book series
IFIP International Federation for Information Processing (IFIPAICT)
Wormhole attacks can destabilize or disable wireless sensor networks. In a typical wormhole attack, the attacker receives packets at one point in the network, forwards them through a wired or wireless link with less latency than the network links, and relays them to another point in the network. This paper describes a distributed wormhole detection algorithm for wireless sensor networks, which detects wormholes based on the distortions they create in a network. Since wormhole attacks are passive in nature, the algorithm uses a hop counting technique as a probe procedure, reconstructs local maps for each node, and then uses a “diameter” feature to detect abnormalities caused by wormholes. The main advantage of the algorithm is that it provides the locations of wormholes, which is useful for implementing countermeasures. Simulation results show that the algorithm has low false detection and false toleration rates.
Keywords: Wireless sensor networks, wormhole detection, distributed algorithm
Download to read the full conference paper text References
I. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, A survey of sensor networks, IEEE Communications, vol. 40(8), pp. 102-114, 2002.
CrossRef Google Scholar
S. Čapkun, L. Buttyán and J. Hubaux, SECTOR: Secure tracking of node encounters in multi-hop wireless networks, Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.
W. Du, L. Fang and P. Ning, LAD: Localization anomaly detection for wireless sensor networks, Journal of Parallel and Distributed Computing, vol. 66(7), pp. 874-886, 2006.
MATH CrossRef Google Scholar
L. Hu and D. Evans, Using directional antennas to prevent wormhole at- tacks, Proceedings of the Eleventh Network and Distributed System Security Symposium, pp. 131-141, 2004.
Y. Hu, A. Perrig and D. Johnson, Wormhole Detection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, Houston, Texas, 2002.
Y. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986, 2003.
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia and B. Bhargava, Low- cost attacks against packet delivery, localization and time synchronization services in underwater sensor networks, Proceedings of the Fourth ACM Workshop on Wireless Security, pp. 87-96, 2005.
L. Lazos and R. Poovendran, SeRLoc: Robust localization for wireless sensor networks, ACM Transactions on Sensor Networks, vol. 1(1), pp. 73-100, 2005.
CrossRef Google Scholar
D. Liu, P. Ning and W. Du, Attack-resistant location estimation in sensor networks, Proceedings of the Fourth International Symposium on Informa- tion Processing in Sensor Networks, pp. 99-106, 2005.
S. McCanne and S. Floyd, The network simulator -ns-2 (nsnam. isi. edu/nsnam/index. php/User Information), 2007.
J. Newsome, E. Shi, D. Song and A. Perrig, The sybil attack in sensor networks: Analysis and defenses, Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
P. Papadimitratos and Z. Haas, Secure routing for mobile ad hoc networks, Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
R. Poovendran and L. Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks, Wireless Networks, vol. 13(1), pp. 27-59, 2007.
CrossRef Google Scholar
The Rice Monarch Project, Wireless and mobility extensions to ns-2 (
www.monarch. cs. cmu. edu/cmu-ns. html
M. Vieira, C. Coelho Jr., D. da Silva Jr. and J. da Mata, Survey of wireless sensor network devices, Proceedings of the IEEE Conference on Emerging Technologies and Factory Automation, vol. 1, pp. 537-544, 2003.
W. Wang and B. Bhargava, Visualization of wormholes in sensor networks, Proceedings of the ACM Workshop on Wireless Security, pp. 51-60, 2004.
A. Wood and J. Stankovic, Denial of service in sensor networks, IEEE Computer, vol. 35(10), pp. 54-62, 2002.
Y. Xu, J. Ford and F. Makedon, A variation on hop counting for geographic routing, Proceedings of the Third IEEE Workshop on Embedded Networked Sensors, 2006.
J. Zheng, Low rate wireless personal area networks: ns-2 simulator for 802. 15. 4 (release v1. 1) (ees2cy. engr. ccny. cuny. edu/zheng/pub), 2007.
© International Federation for Information Processin 2008