Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks

被引:13
作者
Qazi, Shams [1 ]
Raad, Raad [2 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[2] Univ Wollongong, Sch Elect Comp & Telecommun Engn, Wollongong, NSW 2522, Australia
关键词
Ad hoc networks; Wormhole attacks; DelPHI; AODV Round trip time (RTT);
D O I
10.1016/j.jisa.2018.01.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DelPHI [1] is a highly cited protocol that secures Ad hoc On Demand Distance Vector (AODV) routing protocol against wormhole attacks. DelPHI assumes that the underlying wireless transmission rate is constant. Under such an assumption it has a wormhole detection rate above 80%. In this work we show that DelPHI is unable to secure AODV in a multirate transmission environment because it does not take into account the variable bit rate nature of the wireless channel and assumes a constant bit rate leading to either false detection or no detection of wormhole attacks. We go on to propose an extension to DelPHI (M-DelPHI) that adapts it to the multirate 802.11 wireless channel. We propose three fundamental extensions: 1. Multirate channel, 2. Processing delay and 3. Neighbour monitoring. We provide 2 test cases that demonstrate our extension and simulate the new protocol in different environments. We show that M-DelPHI performs exceptionally well resulting in above 90% wormhole detection rate against inbound and out-of-band wormholes under the specified test conditions. Crown Copyright (C) 2018 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 24 条
  • [1] Alshamrani A. S., 2011, Proceedings 2011 25th IEEE International Conference on Advanced Information Networking and Applications Workshops (WAINA 2011), P561, DOI 10.1109/WAINA.2011.68
  • [2] Capkun S., 2003, ACM WORKSHOP SECURIT, P21
  • [3] Chiu H.S., 2006, Wireless pervasive computing, 2006 1st international symposium on, P6, DOI DOI 10.1109/ISWPC.2006.1613586
  • [4] Spoofing-Jamming Attack Strategy Using Optimal Power Distributions in Wireless Smart Grid Networks
    Gai, Keke
    Qiu, Meikang
    Ming, Zhong
    Zhao, Hui
    Qiu, Longfei
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) : 2431 - 2439
  • [5] SA-EAST: Security-Aware Efficient Data Transmission for ITS in Mobile Heterogeneous Cloud Computing
    Gai, Keke
    Qiu, Longfei
    Chen, Min
    Zhao, Hui
    Qiu, Meikang
    [J]. ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [6] Preventing Layer-3 Wormhole Attacks in Ad-hoc Networks with Multipath DSR
    Garcia, Luis Fernando
    Robert, Jean-Marc
    [J]. 2009 THE 8TH IFIP ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP, 2009, : 15 - 20
  • [7] Hu Y- C, ACM WORKSH WIR SEC W
  • [8] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [9] A survey of secure wireless ad hoc routing
    Hu, YC
    Perrig, A
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 28 - 39
  • [10] King Sun Chan, 2011, 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, P388, DOI 10.1109/WiMOB.2011.6085371