Abstract
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful for real-world scenarios. Most importantly, however, the algorithm can always prevent wormholes, irrespective of the density of the network, while its efficiency is not affected even by frequent connectivity changes. We also provide an analytical evaluation of the algorithm’s correctness along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahmed, N., Kanhere, S.S., Jha, S.: The holes problem in wireless sensor networks: a survey. Mobile Computing and Communications Review 9(2), 4–18 (2005)
Buttyán, L., Dóra, L., Vajda, I.: Statistical wormhole detection in sensor networks, pp. 128–141 (2005)
Eriksson, J., Krishnamurthy, S.V., Faloutsos, M.: Truelink: A practical countermeasure to the wormhole attack in wireless networks, pp. 75–84 (2006)
Hai, T.H., Huh, E.-N.: Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge. In: NCA 2008: Proceedings of the 2008 Seventh IEEE International Symposium on Network Computing and Applications, Washington, DC, USA, pp. 325–331. IEEE Computer Society, Los Alamitos (2008)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE Journal on Selected Areas in Communications 24(2), 370–380 (2006)
Issa Khalil, N.B.S., Bagchi, S.: Liteworp: A lightweight countermeasure for the wormhole attack in multihop wireless networks, p. 22 (June 2005)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Networks Journal 1(2-3), 293–315 (2003)
Korkmaz, T.: Verifying physical presence of neighbors against replay-based attacks in wireless ad hoc networks. In: ITCC 2005: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), Washington, DC, USA, vol. II, pp. 704–709. IEEE Computer Society, Los Alamitos (2005)
Krontiris, I., Benenson, Z., Giannetsos, T., Freiling, F., Dimitriou, T.: Cooperative intrusion detection in wsn. In: Roedig, U., Sreenan, C.J. (eds.) EWSN 2009. LNCS, vol. 5432, pp. 263–278. Springer, Heidelberg (2009)
Krontiris, I., Giannetsos, T., Dimitriou, T.: Launching a sinkhole attack in wireless sensor networks; the intruder side. In: SecPriWiMob 2008: First International Workshop on Security and Privacy in Wireless and Mobile Computing, Networking and Communications, Avignon, France, October 12-14 (2008)
Lehsaini, M., Guyennet, H., Feham, M.: A-coverage scheme for wireless sensor networks. In: ICWMC 2008: Proceedings of the 2008 The Fourth International Conference on Wireless and Mobile Communications, Washington, DC, USA, pp. 91–96. IEEE Computer Society, Los Alamitos (2008)
Lehsaini, M., Guyennet, H., Feham, M.: CES: Cluster-based energy-efficient scheme for mobile wireless sensor networks. In: IFIP Conference on Wireless Sensor and Actor Networks, Ontario, Canada (July 2008)
Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 107–115. IEEE, Los Alamitos (2007)
Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Networks 13(1), 27–59 (2007)
Capkun, S.S., Buttyan, L., Hubaux, J.-P.: Sector: secure tracking of node encounters in multi-hop wireless networks. In: SASN 2003: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 21–32. ACM Press, New York (2003)
Savvides, A., Han, C.-C., Strivastava, M.B.: Dynamic fine-grained localization in ad-hoc networks of sensors. In: MobiCom 2001: Proceedings of the 7th annual international conference on Mobile computing and networking, pp. 166–179. ACM Press, New York (2001)
Bhargava, B., Wang, W.: Visualization of wormholes in sensor networks. In: Proceedings of ACM Workshop on Wireless Security (WiSe), in conjunction with MobiCom (October 2004)
Wang, W., Bhargava, B., Lu, Y., Wu, X.: Defending against wormhole attacks in mobile ad hoc networks: Research articles. Wirel. Commun. Mob. Comput. 6(4), 483–503 (2006)
Wang, W., Lu, A.: Interactive wormhole detection and evaluation. Information Visualization 6(1), 3–17 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dimitriou, T., Giannetsos, A. (2010). Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks. In: Rajaraman, R., Moscibroda, T., Dunkels, A., Scaglione, A. (eds) Distributed Computing in Sensor Systems. DCOSS 2010. Lecture Notes in Computer Science, vol 6131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13651-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-13651-1_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13650-4
Online ISBN: 978-3-642-13651-1
eBook Packages: Computer ScienceComputer Science (R0)