Wormhole Attack Detection in Wireless Sensor Networks

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending mechanism and then proposes round trip time (RTT) and neighbor numbers based wormhole detection mechanism. The consideration of proposed mechanism is the RTT between two successive nodes and those nodes- neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. This system does not require any specific hardware, has good performance and little overhead and also does not consume extra energy. The proposed system is designed in ad hoc on-demand distance vector (AODV) routing protocol and analysis and simulations of the proposed system are performed in network simulator (ns-2).




References:
[1] I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on
Sensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.
[2] L. Buttyán, L. Dóra, I. Vajda, Statistical Wormhole Detection in Sensor
Networks, Second European Workshop on Security and Privacy in Ad
Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14,
2005,pp. 128-141
[3] S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of
Node Encounters in Multi-hop Wireless Networks. In Proceedings of the
ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
[4] C. Karlof and D. Wanger. Secure Routing in Sensor Networks: Attacks
and Counter-measures. In Proceedings of the 1st IEEE International
Workshop on Sensor Network Protocols and Applications, Anchorage,
AK, May, 2003, pp.113-127.
[5] J. C. Hou and N. Li, Topology Construction and Maintenance in
Wireless Sensor Networks, Book Chapter of Handbook of Sensor
Networks: Algorithms and Architectures, John Wiley & Sons, Inc. 2005
[6] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole
Attacks. In Proceedings of the IEEE Symposium on Network and
Distributed System Security (NDSS), 2004.
[7] Y. Hu, A. Perring, and D.B. Johnson. Packet Leashes: A Defense against
Wormhole Attacks in Wireless Networks. In Proceedings of 22nd Annual
Conference of the IEEE Computer and Commu-nication Societies,
Vol.3, April 2003. pp.1976-1986.
[8] I. Khalil, S. Bagchi, and N.B. Shroff. LITEWORP: A Lightweight
Countermeasure for the Wormhole Attack in Multihop Wireless
Networks. In proceeding of International Conference on Dependable
Systems and Networks (DSN 2005), Yokohama, Japan.
[9] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang.
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph
Theoretic Approach. In Proceedings of Wireless Communictions and
Networking Conference, 2005.IEEE. March 2005. pp.1193-1199.
[10] A. A. Pirzada, and C. McDonald. Circumventing Sinkholes and
Wormholes in Wireless Sensor Networks. International Work-shop on
Wireless Ad Hoc networks, 2005(5):pp. 132-150.
[11] L. Qian, N. Song, and X. Li, Detecting and locating wormhole attacks in
Wireless Ad Hoc Networks through statistical analysis of multi-path,
IEEE Wireless Communications and Networking Conference - WCNC
2005.
[12] W. Sharif and C. Leckie. New Variants of Wormhole Attacks for Sensor
Networks. In the proceeding of the Australian Telecommunication
Networks and Applications Conference, Melbourne Austrila, December
2006, pp.288-292.
[13] N. Song, L. Qian, and X. Li. Wormhole Attacks Detections in Wireless
Ad Hoc Networks: A Statistical Analysis Approach. In Proceeding of
the 19th International Parallel and Distributed Processing Symposium
(IPDPS-05)
[14] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe,
and K. N. Levitt. A specification-based intrusion detection system for
AODV. In ACM Workshop on Security of Ad Hoc and Sensor Networks
(SASN'03)
[15] W. Wang and B. Bhargava. Visualization of Wormholes in Sensor
Networks. In Proceedings of the ACM workshop on Wireless security
(Wise-04), 2004. pp. 51-60.
[16] W. Wang, B. Bhargava, Y. Lu and X. Wu, Defending Against
Wormhole Attacks in Mobile Ad Hoc Networks, Wireless
Communication and Mobile Computing, Volume 6, Issue:4, June 2006,
pp.483-503.