Distributed Detection of Wormhole Attacks in Wireless Sensor Networks

被引:0
作者
de Graaf, Rennie [1 ]
Hegazy, Islam [1 ]
Horton, Jeffrey [2 ]
Safavi-Naini, Reihaneh [1 ]
机构
[1] Univ Calgary, Dept Comp Sci, Calgary, AB T2N 1N4, Canada
[2] Univ Wollongong, Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
AD HOC NETWORKS | 2010年 / 28卷
关键词
Security; Intrusion detection; Wormholes; Wireless sensor networks; Distributed systems;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Sensors in a wireless sensor network depend on their neighbours to route their messages. Yet, routing protocols in wireless sensor network are vulnerable to different types of attacks. In this paper, we consider the wormhole attack in which the adversary diverts traffic from one part of the network to another part by introducing a low cost tunnel between the two parts. We introduce a distributed intrusion detection system that monitors the communication in the network and propose a criterion for the placement of intrusion detection nodes. The intrusion detection system searches for violations of that criterion to detect wormholes of length above a certain minimum value. We evaluate the effectiveness of our system in a simulated environment. The experiments show that our system can detect 100% of the wormholes that are beyond the communication range of the intrusion detection nodes. Finally, we discuss our results and show directions for future work.
引用
收藏
页码:208 / +
页数:2
相关论文
共 14 条
[1]  
Bo Yu, 2006, Proceedings. 20th International Parallel and Distributed Processing Symposium (IEEE Cat. No.06TH8860)
[2]  
Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128
[3]  
Eriksson Jakob, 2006, 2006 14th IEEE International Conference on Network Protocols, P75
[4]  
Hill J, 2000, ACM SIGPLAN NOTICES, V35, P93, DOI 10.1145/384264.379006
[5]  
Hill J., 2000, THESIS
[6]  
Hu YC, 2003, IEEE INFOCOM SER, P1976
[7]  
Ioannis K., 2007, 13 EUR WIR C
[8]   LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks [J].
Khalil, I ;
Bagchi, S ;
Shroff, NB .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :612-621
[9]  
Krontiris I, 2008, LECT NOTES COMPUT SC, V4837, P150
[10]   Detecting wormhole attacks in wireless networks using connectivity information [J].
Maheshwari, Ritesh ;
Gao, Jie ;
Das, Samir R. .
INFOCOM 2007, VOLS 1-5, 2007, :107-+