Preview

Wormhole

Powerful Essays
Open Document
Open Document
9395 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wormhole
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 6, DECEMBER 2011

1787

Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
Dezun Dong, Member, IEEE, Mo Li, Member, IEEE, Yunhao Liu, Senior Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, and Xiangke Liao
Abstract—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions on the network in order to capture the specific (partial) symptom induced by wormholes. Those requirements and assumptions limit the applicability of previous approaches. In this paper, we present our attempt to understand the impact and inevitable symptom of wormholes and develop distributed detection methods by making as few restrictions and assumptions as possible. We fundamentally analyze the wormhole problem using a topology methodology and propose an effective distributed approach, which relies solely on network connectivity information, without any requirements on special hardware devices or any rigorous assumptions on network properties. We formally prove the correctness of this design in continuous geometric domains and extend it into discrete domains. We evaluate its performance through extensive simulations. Index Terms—Connectivity, topological approach, wireless ad hoc and sensor networks, wormhole detection.

I. INTRODUCTION

W

ORMHOLE attack is one of the most severe security threats [1]–[15] in ad hoc and sensor networks. In wormhole attacks, the attackers tunnel the packets between distant locations in the network through an in-band or out-of-band channel. The wormhole tunnel gives two distant nodes the illusion that they are close to each other. The wormhole can attract and bypass a large amount of network traffic, and thus the attacker can collect and manipulate network traffic. The attacker is able to exploit such a position to launch a variety of attacks, such as dropping or



References: [1] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks,” presented at the SCS CNDS, San Antonio, TX, Jan. 27–31, 2002. [2] K. Sanzgiri, B. Dahill, B. Levine, and E. Belding-Royer, “A secure routing protocol for ad hoc networks,” in Proc. IEEE ICNP, 2002, pp. 78–87. [3] Y.-C. Hu, A. Perrig, and D. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks,” in Proc. IEEE INFOCOM, 2003, vol. 3, pp. 1976–1986. 1796 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 19, NO. 6, DECEMBER 2011 [4] L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” presented at the NDSS, 2004. [5] W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” in Proc. ACM WiSe, 2004, pp. 51–60. [6] W. Wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against wormhole attacks in mobile ad hoc networks,” Wireless Commun. Mobile Comput., vol. 6, pp. 483–503, 2006. [7] J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “Truelink: A practical countermeasure to the wormhole attack in wireless networks,” in Proc. IEEE ICNP, 2006, pp. 75–84. [8] R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Netw., vol. 13, pp. 27–59, 2007. [9] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information,” in Proc. IEEE INFOCOM, 2007, pp. 107–115. [10] S. Capkun, L. Buttyan, and J.-P. Hubaux, “Sector: Secure tracking of node encounters in multihop wireless networks,” in Proc. ACM SASN, 2003, pp. 21–32. [11] I. Khalil, S. Bagchi, and N. B. Shroff, “Liteworp: A light-weight countermeasure for the wormhole attack in multihop wireless networks,” in Proc. DSN, 2005, pp. 612–621. [12] I. Khalil, S. Bagchi, and N. B. Shroff, “Mobiworp: Mitigation of the wormhole attack in mobile multihop wireless networks,” in Proc. IEEE SecureComm, 2006, pp. 1–12. [13] N. Song, L. Qian, and X. Li, “Wormhole attack detection in wireless ad hoc networks: A statistical analysis approach,” in Proc. IEEE IPDPS, 2005. [14] L. Buttyan, L. Dora, and I. Vajda, “Statistical wormhole detection in sensor networks,” in Proc. IEEE ESAS, 2005, pp. 128–141. [15] I. Aad, J.-P. Hubaux, and E. W. Knightly, “Impact of denial of service attacks on ad hoc networks,” IEEE/ACM Trans. Netw., vol. 16, no. 4, pp. 791–802, Aug. 2008. [16] Ö. B. Akan and I. F. Akyildiz, “Event-to-sink reliable transport in wireless sensor networks,” IEEE/ACM Trans. Netw., vol. 13, no. 5, pp. 1003–1016, Oct. 2005. [17] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-based compromisetolerant security mechanisms for wireless sensor networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 247–260, Feb. 2006. [18] M. Luk, G. Mezzour, A. Perrig, and V. Gligor, “MiniSec: A secure sensor network communication architecture,” in Proc. ACM/IEEE IPSN, 2007, pp. 479–488. [19] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A link layer security architecture for wireless sensor networks,” in Proc. ACM SenSys, 2004, pp. 162–175. [20] A. Hatcher, Algebraic Topology. Cambridge, U.K.: Cambridge Univ. Press, 2002. [21] K. Whittlesey, “Greedy optimal homotopy and homology generators,” in Proc. ACM-SIAM SODA, 2005, pp. 1038–1046. [22] J. Erickson and S. Har-Peled, “Optimally cutting a surface into a disk,” in Proc. ACM SCG, 2002, pp. 244–253. [23] M. J. Pelsmajer, M. Schaefer, and D. Stefankovic, “Removing even crossings, continued,” in DePaul CTI 06-016, Aug. 28, 2006, pp. 1–14. [24] Y. Wang, J. Gao, and J. S. Mitchell, “Boundary recognition in sensor networks by topological methods,” in Proc. ACM MobiCom, 2006, pp. 122–133. Dezun Dong (S’09–M’10) received the B.S., M.S., and Ph.D. degrees in computer science at National University of Defense Technology (NUDT), Changsha, China, in 2002, 2004, and 2010, respectively. He was a Visiting Scholar with the Computer Science and Engineering Department, Hong Kong University of Science and Technology, Hong Kong, from November 2008 to May 2010. He is currently an Assistant Professor with the School of Computer, NUDT. His research interests are wireless networks, distributed computing, and high-performance computer systems. Mo Li (M’06) received the B.S. degree in computer science and technology from Tsinghua University, Beijing, China, in 2004, and the Ph.D. degree in computer science and engineering from Hong Kong University of Science and Technology, Hong Kong, in 2009. He is a Nanyang Assistant Professor with the Computer Science Division, School of Computer Engineering, Nanyang Technological University, Singapore. His research interests include distributed systems, wireless sensor networks, pervasive computing and RFID, and wireless and mobile systems. Yunhao Liu (M’02–SM’06) received the B.S. degree in automation from Tsinghua University, Beijing, China, in 1995, and the M.S. and Ph.D. degrees in computer science and engineering from Michigan State University, East Lansing, in 2003 and 2004, respectively. He is a Professor with the Tsinghua National Lab for Information Science and Technology, School of Software, and the Director of the MOE Key Lab for Information Security, Tsinghua University. He is also a faculty member with the Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Hong Kong. Xiang-Yang Li (SM’08) received the B.S. degree from Tsinghua University, Beijing, China, in 1995, and the M.S. and Ph.D. degrees from the University of Illinois at Urbana–Champaign in 2000 and 2001, respectively, all in computer science. Currently, he is an Associate Professor with the Department of Computer Science, Illinois Institute of Technology, Chicago. His research interests span wireless ad hoc networks, computational geometry, game theory, and cryptography and network security. Xiangke Liao received the B.S. degree in computer science from Tsinghua University, Beijing, China, in 1985, and the M.S. degrees in computer science from the National University of Defense Technology (NUDT), Changsha, China, in 1988. He is now a Professor and the Dean of the School of Computer, NUDT. His research interests include parallel and distributed computing, high-performance computer systems, operating system, and networked embedded system.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 7 Exercise 1

    • 489 Words
    • 2 Pages

    The proposed method is illustrated as a flow chart in Fig 3. First, the source node broadcast the RREQ to neighbor nodes. The neighbor nodes forward the Route Request (RREQ) to the destination node. Destination node stores the neighbor RREQ in a table and checks the RREQ. If RREQ is from the true Source node address, then the system is regular and begins to transmit test data packets otherwise repeat the process. Next, it will check the packet delivery ratio if packet delivery ratio drops to threshold then Send Bait RREQ. The source node randomly chooses one-hop neighbor node (nr) as a destination node. The Source node selects one-hop neighbor node nr as the destination node and sends the RREQ to that node. First, if nr had not launched black hole attack, then after the source node had sent the RREQ, then other nodes in addition to nr node also reply with RREP. It indicates that there is an Attacker in Reply routing. If the only nr sent RREP then…

    • 489 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    Lan Consulting Plan

    • 2879 Words
    • 12 Pages

    Axia College. (2006). Network security. Retrieved August 28, 2009, from Axia College, Week Seven, IT 240 Intro to LAN Technologies.…

    • 2879 Words
    • 12 Pages
    Powerful Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    The challenge for an attacker is finding vulnerabilities in software or in web protocols in order to intercept communication between two devices. Common target protocols to exploit are the Address Resolution Protocol (ARP), and the Domain Name System (DNS). Steps have been taken to make these protocols more secure in order to prevent MitM attacks. Furthermore, the Transport Layer Security (TLS) (and its predecessor, Secure Sockets Layer (SSL)) mitigate the risk from MitM attacks over the internet.…

    • 1605 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    wireshark

    • 452 Words
    • 3 Pages

    The project this week involved a deeper dive into the packet structure for the wireless protocol. Identifying the Authentication and Authorization was trickier than it appeared initially. Identifying the authentication and ciphers can come in handy when trying to identify an endpoint is not being allowed on the internet which is a frequent problem in a secure location.…

    • 452 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Sample Question Paper

    • 4697 Words
    • 19 Pages

    Dr Wenjing Jia Lecturer, School of Computing and Communications Faculty of Engineering and Information Technology, University of Technology, Sydney (UTS) Phone: (02) 9514 7873 Email:Wenjing.Jia@uts.edu.au…

    • 4697 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    First, we present an evil twin detection strategy called context-leashing based upon recording the nearby access points when first associating with an access point. Using this contextual information, the client determines if an adversary has setup an evil twin access point at a different location. Next, we propose an SSH-style authentication method called EAP-SWAT to perform one-way access point authentication that fits into the extensible authentication protocol (EAP) framework. I. I NTRODUCTION…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Satisfactory Essays

    Network

    • 264 Words
    • 2 Pages

    COEN 233 Computer Networks Department of Computer Engineering Santa Clara University Dr. Ming-Hwa Wang Phone: (408) 525-2564 Course website: Office Hours: Fall Quarter 2012 Email address: mwang2@engr.scu.edu http://www.cse.scu.edu/~mwang2/network/ Monday & Wednesday 9:00-9:30pm…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Frankk, D. (2012, May 25). Important Security Issues in Wireless Networks. Retrieved from Examiner.com: http://www.examiner.com/article/security-issues-wireless-networks…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Network Simulator

    • 1018 Words
    • 5 Pages

    IEEE 802.11 is the de facto standard for WLANs. It specifies both the medium access control (MAC) and the physical (PHY) layers for WLANs. The MAC layer operates on top of one of several physical layers. Medium access is performed using Carrier Sense Multiple Access with Collision Avoidance. However, simple CSMA is susceptible to the hidden node problem, especially in so called ad hoc networks where a node may communicate directly with every other node in range or using intermediate nodes as relays otherwise. Hidden nodes cause costly packet collisions and thus significantly affect network performance. In order to combat the hidden node problem, a mechanism known as Request to Send/Clear to Send (RTS/CTS) handshake is often used. RTS/CTS mechanism is supported in the IEEE 802.11 family of standards. The RTS/CTS mechanism was initially proposed in a protocol called Multiple- Access with Collision Avoidance (MACA). From a network point of view, one of the primary reasons for using the RTS/CTS mechanism is to avoid network congestion resulting from frequent packet collisions. Figure 1 depicts a conceptual “throughput versus Packet Size” curve for a network. In the presence of congestion, the throughput goes to zero as the Packet Size is increased beyond a certain value. A properly designed network, on the other hand, maintains the maximum throughput as the Packet Size goes to infinity.…

    • 1018 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Abstract - The rapid adoption and highly distributed nature of wireless networks has made it vulnerable to attacks and calls for innovative strategies of defense for network security. The lack of cables and transfer of information over airwaves makes data exchange more susceptible to interception. Furthermore, it is difficult to implement effective methods of security without sacrificing the quality and speed of network operations. For the previous reasons, wireless security has become a common topic of interest in research projects and will be the basis of discussion for this paper.…

    • 7348 Words
    • 30 Pages
    Better Essays
  • Good Essays

    Misra, S., Misra, S. C., & Woungang, I. (2010). Selected topics in communication networks and distributed systems. Singapore: World Scientific.…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Wireless Security

    • 3481 Words
    • 14 Pages

    Wireless devices, like all technologies that provide external access to corporate networks, present security challenges. With wireless standards and practices still rapidly evolving, it is important to understand the strengths and limitations of available technologies in order to implement a secure solution. Extending current security policies to encompass wireless devices requires an understanding of the security features of both wireless devices and wireless networks.…

    • 3481 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    cyber security

    • 3203 Words
    • 13 Pages

    History has shown that wars are won not only by the courage and strength of the men and women on the battlefield; but also, by the evolving technology adopted by the military. In the cyberspace, two distinct regimes emerge for the military. The first regime is the open network with its inherent risks and vulnerabilities which is essential for collaboration, information sharing, logistics etc. The second regime of closed network meets the demands of security, speed of operation and availability of information at the right time and place. To maintain confidentiality, integrity and availability, closed network is air gapped from open network. In addition to these networks, the military is also exposed to commercial off the shelf (COTS) hardware and software products for wireless, cellular phones, computers, networking equipment etc. Therefore, increased dependence of the military on civilian cyberspace capabilities have inherent risks and make them vulnerable to cyber-attacks by attack vectors which are prevalent in commercial/open cyberspace. This paper draws attention to current cyber threats and challenges that the military faces.…

    • 3203 Words
    • 13 Pages
    Powerful Essays