WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks

  • Ji-Hoon Yun
  • Il-Hwan Kim
  • Jae-Han Lim
  • Seung-Woo Seo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4412)

Abstract

The wormhole attack, which is accomplished by selectively relaying packets between two adversaries, can ruin routing and communication of the network without compromising any legitimate nodes. There have been a few countermeasures against the wormhole attack in generic ad hoc networks, but they are not appropriate for sensor networks since they require special devices (e.g. directional antenna) or put much overhead on each node. In this paper, we propose a new countermeasure against the wormhole attack for sensor networks, named WODEM. In WODEM, a few detector nodes equipped with location-aware devices and longer-lasting batteries detect wormholes, and normal sensor nodes are only required to forward control packets from the detector nodes. Therefore, WODEM is efficient in cost and energy. From the simulation results, we show that 10 detector nodes can detect a wormhole within the accuracy of 90% in a densely deployed sensor network.

Keywords

sensor network security wormhole attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Perrig, A., et al.: SPINS: Security protocols for sensor networks. In: Proceedings of Mobile Networking and Computing (2001)Google Scholar
  2. 2.
    Hu, Y.C., et al.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE INFOCOM 2003, vol. 3, IEEE, Los Alamitos (2003)Google Scholar
  3. 3.
    Hu, L., Evans, D.: Using Directional Antennas to Prevent Wormhole Attacks. In: The 11th Annual Network and Distributed System Security Symposium, San Diego, California (February 2004)Google Scholar
  4. 4.
    Khalil, I., et al.: LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In: International Conference on Dependable Systems and Networks (DSN) (June 2005)Google Scholar
  5. 5.
    MICA2 series, http://www.xbow.com
  6. 6.
    Rappaport, T.: Wireless Communications: Principles and Practice. Prentice Hall PTR, Englewood Cliffs (2001)Google Scholar
  7. 7.
    Perkins, C.E.: Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, IETF (July 2003)Google Scholar
  8. 8.
    ZigBee Specification, Ver. 053474r10, ZigBee Alliance (July 2006)Google Scholar
  9. 9.
    Perkins, C.E.: Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In: ACM SIGCOMM’94, ACM Press, New York (1994)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Ji-Hoon Yun
    • 1
  • Il-Hwan Kim
    • 1
  • Jae-Han Lim
    • 2
  • Seung-Woo Seo
    • 1
  1. 1.EECS, Seoul National UniversityKorea
  2. 2.ETRIKorea

Personalised recommendations