Local Connectivity Tests to Identify Wormholes in Wireless Networks

被引:12
作者
Ban, Xiaomeng [1 ]
Sarkar, Rik [2 ]
Gao, Jie [1 ]
机构
[1] SUNY Stony Brook, Comp Sci, Stony Brook, NY 11794 USA
[2] Free Univ Berlin, Comp Sci, Berlin, Germany
来源
PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC' 11) | 2011年
关键词
Wormhole Attack; Wireless Networks; Network Security; AD HOC; ATTACKS;
D O I
10.1145/2107502.2107519
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
A wormhole attack places two radio transceivers connected by a high capacity link and retransmits wireless signals from one antenna at the other. This creates a set of shortcut paths in the network, and may attract a lot of traffic to the wormhole link. The link thus gains control of a large fraction of network traffic which opens the door for more dangerous attacks afterwards. In this paper we introduce a wormhole detection and removal algorithm based on local connectivity tests. The basic idea is that the neighborhood of a wormhole contains two sets of nodes corresponding to two sides of the wormhole. The distance between these two sets is small when using paths that pass through the wormhole link, but is large when only regular network paths are considered. Thus we remove a small neighborhood that will contain potential wormhole links and check if a slightly larger neighborhood falls apart to multiple connected components. To accommodate spatial and temporal unpredictability of wireless communication links we abstract the network connectivity as an arbitrary graph so that the method does not assume any idealistic models (such as unit disk graph model). The algorithm uses purely local connectivity information, handles multiple wormhole attacks and generalizes to wireless networks deployed in 3D. It does not suffer from typical limitations in previous work such as the requirements of special hardware, communication models, synchronization, node density etc. In simulations, our method is seen to beat the state of the art solutions, in particular for cases where previous solutions experience poor performance.
引用
收藏
页数:11
相关论文
共 20 条
[1]  
Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128
[2]  
Capkun S., 2003, 1 ACM WORKSH SEC AD
[3]  
Dezun Dong, 2009, Proceedings of the 2009 IEEE 15th International Conference on Parallel and Distributed Systems (ICPADS 2009), P72, DOI 10.1109/ICPADS.2009.97
[4]   Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks [J].
Dong, Dezun ;
Li, Mo ;
Liu, Yunhao ;
Li, Xiang-Yang ;
Liao, Xiangke .
2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, :314-+
[5]   ARBORICITY AND BIPARTITE SUBGRAPH LISTING ALGORITHMS [J].
EPPSTEIN, D .
INFORMATION PROCESSING LETTERS, 1994, 51 (04) :207-211
[6]  
Eriksson J., 2006, ICNP
[7]  
Hu YC, 2003, IEEE INFOCOM SER, P1976
[8]   Wormhole attacks in wireless networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :370-380
[9]   LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks [J].
Khalil, I ;
Bagchi, S ;
Shroff, NB .
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, :612-621
[10]   MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks [J].
Khalil, Issa ;
Bagchi, Saurabh ;
Shroff, Ness B. .
AD HOC NETWORKS, 2008, 6 (03) :344-362