Wormhole Detection in Wireless Ad Hoc Networks
نویسندگان
چکیده
As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack against ad hoc routing protocols that is particularly challenging to defend against. We show how an attacker can use the wormhole attack to cripple a range of ad hoc network routing protocols. In the wormhole attack, an attacker records packets (or bits) at one location in the network, tunnels them to another location, and retransmits them there into the network. Most existing ad hoc network routing protocols, without some mechanism to defend them against the wormhole attack, would be unable to find routes longer than one or two hops, severely disrupting communication. In this paper, we present the design of two protocols capable of detecting a wormhole attack at the receiver: the Slot Authenticated MAC protocol and the TIK protocol. Both protocols rely on tight time synchronization, which can be readily available through off-the-shelf hardware. These two protocols make different tradeoffs: the Slot Authenticated MAC is a simple, very resource-efficient approach based on a TDMA MAC, whereas TIK is a practical, novel approach that has somewhat higher network overhead and resource requirements, but features significantly reduced latency. The computational requirements of TIK are well within the range of existing handhelds computers. For example, in an 11Mbps wireless LAN, a Compaq iPaq 3870 PocketPC is capable of handling the maximum rate of cryptographic operations associated with TIK, using just 3% of its built-in memory and 18% of its CPU time.
منابع مشابه
A New Intrusion Detection System to deal with Black Hole Attacks in Mobile Ad Hoc Networks
By extending wireless networks and because of their different nature, some attacks appear in these networks which did not exist in wired networks. Security is a serious challenge for actual implementation in wireless networks. Due to lack of the fixed infrastructure and also because of security holes in routing protocols in mobile ad hoc networks, these networks are not protected against attack...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کاملRound Trip Time based Wormhole Attacks Detection
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc networks is wormhole attacks and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas This paper analyzes the nature of wormhole attack and existing methods of defending mec...
متن کاملDetection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach
Various routing attacks for single-path routing have been identified for wireless ad hoc networks and the corresponding counter measures have been proposed in the literature. However, the effects of routing attacks on multi-path routing have not been addressed. In this paper, the performance of multi-path routing under wormhole attack is studied in detail. The results show that multi-path routi...
متن کاملWormhole Attack Detection in Wireless Sensor Networks
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending me...
متن کاملA Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network
The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attack in wireless ad hoc and sensor network is the wormhole attack. It is a particularly severe attack on routing protocols for ad hoc networks in which two or more colluding attackers record packets at one location, and tunnel them to another location for a replay at t...
متن کامل