PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES

Marianne Amir Azer, Sherif Mohammed El-Kassas, Mady Saiid El-Soudani

2009

Abstract

Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features, they are vulnerable to many attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant point, which replays them locally. In this paper we explain the wormhole attack modes and propose two schemes for the wormhole attack prevention in ad hoc networks. The schemes rely on the idea that usually the wormhole nodes participate in the routing in a repeated way as they attract most of the traffic. Therefore, each node will be assigned a cost depending in its participation in routing. The cost function is chosen to be exponential in powers of two such that to rapidly increase the cost of already used nodes. Besides preventing the wormhole attack, these schemes provide a load balance among nodes to avoid exhausting a node that is always cooperative in routing.

References

  1. Perkins, C., Royer, E., 2000. The Ad hoc On-Demand Distance Vector Protocol. In C. E. Perkins, editor, Ad hoc Networking, Addison-Wesley, pp. 173-219.
  2. Karlof C., Wagner,D., 2003.Secure Routing in Sensor Networks: Attacks and Countermeasures. In the 1st IEEE International Workshop on Sensor Network Protocols and Applications, May, 2003.
  3. Hu, Y., Perrig, A., Johnson, D.,2003. Packet leashes: a defense against wormhole attacks in wireless networks. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1976- 1986.
  4. Hu, L., Evans, D., 2004. Using Directional Antennas to Prevent Wormhole Attacks, In Network and Distributed System Security Symposium (NDSS).
  5. Khalil,I., Bagchi, S., Shroff, N., 2005. LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. In 2005 International Conference on Dependable Systems and Networks (DSN'05), pp. 612-621.
  6. Choi, S., Kim, D., Lee, D., Jung, J., 2008. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. In Sensor Networks, Ubiquitous and Trustworthy Computing 2008 SUTC 7808. IEEE International Conference on, vol., no., pp.343-348.
  7. Khurana, S., Gupta, N., 2008. FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks. In securware 2008 Second International Conference on Emerging Security Information, Systems and Technologies, pp.74-79.
  8. Wang, X., 2006. Intrusion Detection Techniques in Wireless Ad Hoc Networks. In 30th Annual International Computer Software and Applications Conference (COMPSAC'06), pp. 347-349, 2006.
  9. Wang, X., Wong, J., 2007. An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks. In 31st Annual International Computer Software and Applications Conference - Vol. 1- (COMPSAC 2007), pp. 39-48.
  10. Zhang, Y., Liu, W., Lou, W., and Fang, Y, 2005. Securing sensor networks with location-based keys. In WCNC 2005, IEEE Wireless Communications and Networking Conference, no. 1, pp. 1909 - 1914.
  11. Poovendran, R., Lazos, L., 2007. A graph theoretic framework for preventing the wormhole attack. In wireless ad hoc networks, Volume 13, Issue 1, ISSN: 1022-0038, pp. 27 - 59, 2007.
  12. Song,N., Qian, L., Li, X., 2005. Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. In 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17.
  13. Buttyan, L., Dora, L., Vajda, I., 2005. Statistical wormhole detection in sensor networks. In Hungary, July 2005.
  14. Maheshwari, r., Gao, J., Das, S., 2007 Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information, In INFOCOM 2007, 26th IEEE International Conference on Computer Communications, IEEE (2007), pp. 107-115.
  15. Wang, W., Bhargava, B., 2004. Visulization of wormholes in sensor networks. In Proceeding of the ACMWorkshop onWireless Security (WiSe), pp. 51- 60, 2004.
  16. Azer, M., El-Kassas, S., El-Soudani, M., 2006. Using Attack Graphs in Ad Hoc Networks for Intrusion Prediction Correlation and Detection. In SECRYPT 2006, pp. 63-68.
  17. Win, K., 2008. Analysis of Detecting Wormhole Attack in Wireless Networks. In Proceedings of world Academy of Science, Engineering and Technology Volume 36 December 2008 ISSN 2070-3740.
  18. Kong, F., Li, C., Ding, Q., Cui, G., and Cui, B., 2009. WAPN: A Distributed Wormhole Attack Detection Approach for Wireless Sensor Networks. In Journal of Zhejiang University SCIENCE A, vol. 10, pp. 279289, February 2009.
  19. Gunhee, L., Jungtaek, S., and Dong-kyoo, K., 2008. An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks," in Proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008), pp. 220-225.
Download


Paper Citation


in Harvard Style

Amir Azer M., Mohammed El-Kassas S. and Saiid El-Soudani M. (2009). PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 69-74. DOI: 10.5220/0002178400690074


in Bibtex Style

@conference{secrypt09,
author={Marianne Amir Azer and Sherif Mohammed El-Kassas and Mady Saiid El-Soudani},
title={PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={69-74},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002178400690074},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
SN - 978-989-674-005-4
AU - Amir Azer M.
AU - Mohammed El-Kassas S.
AU - Saiid El-Soudani M.
PY - 2009
SP - 69
EP - 74
DO - 10.5220/0002178400690074