Wormhole Attack Detection in Wireless Sensor Networks
The nature of wireless ad hoc and sensor networks
make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack and
most proposed protocols to defend against this attack used
positioning devices, synchronized clocks, or directional antennas.
This paper analyzes the nature of wormhole attack and existing
methods of defending mechanism and then proposes round trip time
(RTT) and neighbor numbers based wormhole detection mechanism.
The consideration of proposed mechanism is the RTT between two
successive nodes and those nodes- neighbor number which is needed
to compare those values of other successive nodes. The identification
of wormhole attacks is based on the two faces. The first consideration
is that the transmission time between two wormhole attack affected
nodes is considerable higher than that between two normal neighbor
nodes. The second detection mechanism is based on the fact that by
introducing new links into the network, the adversary increases the
number of neighbors of the nodes within its radius. This system does
not require any specific hardware, has good performance and little
overhead and also does not consume extra energy. The proposed
system is designed in ad hoc on-demand distance vector (AODV)
routing protocol and analysis and simulations of the proposed system
are performed in network simulator (ns-2).
[1] I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on
Sensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.
[2] L. Buttyán, L. Dóra, I. Vajda, Statistical Wormhole Detection in Sensor
Networks, Second European Workshop on Security and Privacy in Ad
Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14,
2005,pp. 128-141
[3] S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of
Node Encounters in Multi-hop Wireless Networks. In Proceedings of the
ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
[4] C. Karlof and D. Wanger. Secure Routing in Sensor Networks: Attacks
and Counter-measures. In Proceedings of the 1st IEEE International
Workshop on Sensor Network Protocols and Applications, Anchorage,
AK, May, 2003, pp.113-127.
[5] J. C. Hou and N. Li, Topology Construction and Maintenance in
Wireless Sensor Networks, Book Chapter of Handbook of Sensor
Networks: Algorithms and Architectures, John Wiley & Sons, Inc. 2005
[6] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole
Attacks. In Proceedings of the IEEE Symposium on Network and
Distributed System Security (NDSS), 2004.
[7] Y. Hu, A. Perring, and D.B. Johnson. Packet Leashes: A Defense against
Wormhole Attacks in Wireless Networks. In Proceedings of 22nd Annual
Conference of the IEEE Computer and Commu-nication Societies,
Vol.3, April 2003. pp.1976-1986.
[8] I. Khalil, S. Bagchi, and N.B. Shroff. LITEWORP: A Lightweight
Countermeasure for the Wormhole Attack in Multihop Wireless
Networks. In proceeding of International Conference on Dependable
Systems and Networks (DSN 2005), Yokohama, Japan.
[9] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang.
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph
Theoretic Approach. In Proceedings of Wireless Communictions and
Networking Conference, 2005.IEEE. March 2005. pp.1193-1199.
[10] A. A. Pirzada, and C. McDonald. Circumventing Sinkholes and
Wormholes in Wireless Sensor Networks. International Work-shop on
Wireless Ad Hoc networks, 2005(5):pp. 132-150.
[11] L. Qian, N. Song, and X. Li, Detecting and locating wormhole attacks in
Wireless Ad Hoc Networks through statistical analysis of multi-path,
IEEE Wireless Communications and Networking Conference - WCNC
2005.
[12] W. Sharif and C. Leckie. New Variants of Wormhole Attacks for Sensor
Networks. In the proceeding of the Australian Telecommunication
Networks and Applications Conference, Melbourne Austrila, December
2006, pp.288-292.
[13] N. Song, L. Qian, and X. Li. Wormhole Attacks Detections in Wireless
Ad Hoc Networks: A Statistical Analysis Approach. In Proceeding of
the 19th International Parallel and Distributed Processing Symposium
(IPDPS-05)
[14] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe,
and K. N. Levitt. A specification-based intrusion detection system for
AODV. In ACM Workshop on Security of Ad Hoc and Sensor Networks
(SASN'03)
[15] W. Wang and B. Bhargava. Visualization of Wormholes in Sensor
Networks. In Proceedings of the ACM workshop on Wireless security
(Wise-04), 2004. pp. 51-60.
[16] W. Wang, B. Bhargava, Y. Lu and X. Wu, Defending Against
Wormhole Attacks in Mobile Ad Hoc Networks, Wireless
Communication and Mobile Computing, Volume 6, Issue:4, June 2006,
pp.483-503.
[1] I.F. Akylidiz, W.Su, Y. Sankarubramaniam, E. Cayiric. A Survey on
Sensor Networks. IEEE Computer Magazine. August 2002. pp.102-114.
[2] L. Buttyán, L. Dóra, I. Vajda, Statistical Wormhole Detection in Sensor
Networks, Second European Workshop on Security and Privacy in Ad
Hoc and Sensor Networks (ESAS 2005), Visegrád, Hungary, July 13-14,
2005,pp. 128-141
[3] S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of
Node Encounters in Multi-hop Wireless Networks. In Proceedings of the
ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.
[4] C. Karlof and D. Wanger. Secure Routing in Sensor Networks: Attacks
and Counter-measures. In Proceedings of the 1st IEEE International
Workshop on Sensor Network Protocols and Applications, Anchorage,
AK, May, 2003, pp.113-127.
[5] J. C. Hou and N. Li, Topology Construction and Maintenance in
Wireless Sensor Networks, Book Chapter of Handbook of Sensor
Networks: Algorithms and Architectures, John Wiley & Sons, Inc. 2005
[6] L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole
Attacks. In Proceedings of the IEEE Symposium on Network and
Distributed System Security (NDSS), 2004.
[7] Y. Hu, A. Perring, and D.B. Johnson. Packet Leashes: A Defense against
Wormhole Attacks in Wireless Networks. In Proceedings of 22nd Annual
Conference of the IEEE Computer and Commu-nication Societies,
Vol.3, April 2003. pp.1976-1986.
[8] I. Khalil, S. Bagchi, and N.B. Shroff. LITEWORP: A Lightweight
Countermeasure for the Wormhole Attack in Multihop Wireless
Networks. In proceeding of International Conference on Dependable
Systems and Networks (DSN 2005), Yokohama, Japan.
[9] L. Lazos, R. Poovendran, C. Meadows, P. Syverson, L.W. Chang.
Preventing Wormhole Attacks on Wireless Ad Hoc Networks: A Graph
Theoretic Approach. In Proceedings of Wireless Communictions and
Networking Conference, 2005.IEEE. March 2005. pp.1193-1199.
[10] A. A. Pirzada, and C. McDonald. Circumventing Sinkholes and
Wormholes in Wireless Sensor Networks. International Work-shop on
Wireless Ad Hoc networks, 2005(5):pp. 132-150.
[11] L. Qian, N. Song, and X. Li, Detecting and locating wormhole attacks in
Wireless Ad Hoc Networks through statistical analysis of multi-path,
IEEE Wireless Communications and Networking Conference - WCNC
2005.
[12] W. Sharif and C. Leckie. New Variants of Wormhole Attacks for Sensor
Networks. In the proceeding of the Australian Telecommunication
Networks and Applications Conference, Melbourne Austrila, December
2006, pp.288-292.
[13] N. Song, L. Qian, and X. Li. Wormhole Attacks Detections in Wireless
Ad Hoc Networks: A Statistical Analysis Approach. In Proceeding of
the 19th International Parallel and Distributed Processing Symposium
(IPDPS-05)
[14] C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe,
and K. N. Levitt. A specification-based intrusion detection system for
AODV. In ACM Workshop on Security of Ad Hoc and Sensor Networks
(SASN'03)
[15] W. Wang and B. Bhargava. Visualization of Wormholes in Sensor
Networks. In Proceedings of the ACM workshop on Wireless security
(Wise-04), 2004. pp. 51-60.
[16] W. Wang, B. Bhargava, Y. Lu and X. Wu, Defending Against
Wormhole Attacks in Mobile Ad Hoc Networks, Wireless
Communication and Mobile Computing, Volume 6, Issue:4, June 2006,
pp.483-503.
@article{"International Journal of Electrical, Electronic and Communication Sciences:57109", author = "Zaw Tun and Aung Htein Maw", title = "Wormhole Attack Detection in Wireless Sensor Networks", abstract = "The nature of wireless ad hoc and sensor networks
make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack and
most proposed protocols to defend against this attack used
positioning devices, synchronized clocks, or directional antennas.
This paper analyzes the nature of wormhole attack and existing
methods of defending mechanism and then proposes round trip time
(RTT) and neighbor numbers based wormhole detection mechanism.
The consideration of proposed mechanism is the RTT between two
successive nodes and those nodes- neighbor number which is needed
to compare those values of other successive nodes. The identification
of wormhole attacks is based on the two faces. The first consideration
is that the transmission time between two wormhole attack affected
nodes is considerable higher than that between two normal neighbor
nodes. The second detection mechanism is based on the fact that by
introducing new links into the network, the adversary increases the
number of neighbors of the nodes within its radius. This system does
not require any specific hardware, has good performance and little
overhead and also does not consume extra energy. The proposed
system is designed in ad hoc on-demand distance vector (AODV)
routing protocol and analysis and simulations of the proposed system
are performed in network simulator (ns-2).", keywords = "AODV, Wormhole attacks, Wireless ad hoc andsensor networks", volume = "2", number = "10", pages = "2272-6", }