Skip to main content

Defence against Wormhole Attacks in Wireless Mesh Networks

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7671)

Abstract

Wormhole attack is one of the most severe security threats on wireless mesh network. Unfortunately, most of the existing wormhole defence mechanisms are not secure against wormhole attacks while launched in participation mode. In this paper, we propose a wormhole defence mechanism (WDM), which operates in conjunction with any underlying routing protocol to detect the presence of wormhole during route discovery. The mechanism is based on the unit-disk graph model which defines necessary and sufficient condition for a secure path. WDM is resistant against hidden and exposed wormhole attacks, and does not rely on any extra hardware like global positioning system, time or connectivity information.

Keywords

  • Wormhole Attack
  • Secure Routing
  • Unit Disk Graph
  • Wireless Mesh Network

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh networks: A Survey. Journal of Computer Networks and ISDN Systems 47(4), 445–487 (2005)

    CrossRef  MATH  Google Scholar 

  2. Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks. In: Wireless Mesh Networks: Architectures and Protocols. Springer (2008)

    Google Scholar 

  3. Hu, Y., Perrig, A., Johnson, D.: Packet Leashes: A Defence Against Wormhole Attacks in Wireless Networks. In: Proceedings of the Twenty Second IEEE International Conference on Computer and Communications, vol. 3, pp. 1976–1986 (April 2003)

    Google Scholar 

  4. Wang, Y., Zhang, Z., Wu, J.: A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information. In: Proceedings of IEEE Fifth International Conference on Networking, Architecture and Storage, pp. 63–72 (July 2010)

    Google Scholar 

  5. Hayajneh, T., Krishnamurthy, P., Tipper, D.: DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad hoc Networks. In: Proceedings of Third International Conference on Network and System Security, pp. 73–80 (October 2009)

    Google Scholar 

  6. Su, M.Y.: WARP: A Wormhole Avoidance Routing Protocol by Anomaly Detection in Mobile Ad hoc Networks. Computers and Security 29(2), 208–224 (2010)

    CrossRef  Google Scholar 

  7. Perkins, C.E., Royer, E.M., Das, S.R.: Ad hoc On-demand Distance Vector (AODV) Routing. IETF Internet Draft. MANET Working Group (January 2004)

    Google Scholar 

  8. Choi, S., Kim, D.Y., Lee, D.H., Jung, J.I.: WAP: Wormhole Attack Prevention Algorithm in Mobile Ad hoc Networks. In: Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343–348 (2008)

    Google Scholar 

  9. Wang, X., Wong, J.: An End-to-End Detection of Wormhole Attack in Wireless Ad hoc Networks. In: Proceedings of the Thirty-First Annual International Computer Software and Applications Conference, pp. 39–48 (July 2007)

    Google Scholar 

  10. Znaidi, W., Minier, M., Babau, J.P.: Detecting Wormhole Attacks in Wireless Networks using Local Neighborhood Information. In: Proceedings of IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, pp. 1–5 (September 2008)

    Google Scholar 

  11. Tun, Z., Maw, A.H.: Wormhole Attack Detection in Wireless Sensor Networks. Proceedings of World Academy of Science Engineering and Technology 46, 545–550 (2008)

    Google Scholar 

  12. Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks. IEEE Transactions on Wireless Communications 8(2), 736–745 (2009)

    CrossRef  Google Scholar 

  13. Tran, P., Hung, L.X., Lee, Y.K., Lee, S., Lee, H.: TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad hoc Networks. In: Proceedings of Fourth IEEE Consumer Communication and Networking Conference, pp. 593–598 (May 2007)

    Google Scholar 

  14. Korkmaz, T.: Verifying Physical Presence of Neighbors Against Replay-Based Attacks in Wireless Ad hoc Networks. In: Proceedings of International Conference on Information Technology: Coding and Computing, pp. 704–709 (April 2005)

    Google Scholar 

  15. Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In: Proceedings of the First ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21–32 (October 2003)

    Google Scholar 

  16. IEEE P802.11s/D5.0 Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 10: Mesh Networking

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Matam, R., Tripathy, S. (2012). Defence against Wormhole Attacks in Wireless Mesh Networks. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)