A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks

被引:0
|
作者
Radha Poovendran
Loukas Lazos
机构
[1] University of Washington,Network Security Lab, Department of EE
来源
Wireless Networks | 2007年 / 13卷
关键词
Wormhole attack; Security; Wireless ad hoc networks; Geometric random graphs;
D O I
暂无
中图分类号
学科分类号
摘要
Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure and uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate the wormhole attack in wireless ad hoc networks, an attack that can disrupt vital network functions such as routing. In the wormhole attack, the adversary establishes a low-latency unidirectional or bi-directional link, such as a wired or long-range wireless link, between two points in the network that are not within communication range of each other. The attacker then records one or more messages at one end of the link, tunnels them via the link to the other end, and replays them into the network in a timely manner. The wormhole attack is easily implemented and particularly challenging to detect, since it does not require breach of the authenticity and confidentiality of communication, or the compromise of any host. We present a graph theoretic framework for modeling wormhole links and derive the necessary and sufficient conditions for detecting and defending against wormhole attacks. Based on our framework, we show that any candidate solution preventing wormholes should construct a communication graph that is a subgraph of the geometric graph defined by the radio range of the network nodes. Making use of our framework, we propose a cryptographic mechanism based on local broadcast keys in order to prevent wormholes. Our solution does not need time synchronization or time measurement, requires only a small fraction of the nodes to know their location, and is decentralized. Hence, it is suitable for networks with the most stringent constraints such as sensor networks. Finally, we believe our work is the first to provide an analytical evaluation in terms of probabilities of the extent to which a method prevents wormholes.
引用
收藏
页码:27 / 59
页数:32
相关论文
共 50 条
  • [1] A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks
    Poovendran, Radha
    Lazos, Loukas
    WIRELESS NETWORKS, 2007, 13 (01) : 27 - 59
  • [2] Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach
    Lazos, L
    Poovendran, R
    Meadows, C
    Syverson, P
    Chang, LW
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1193 - 1199
  • [3] PREVENTING WORMHOLE ATTACK IN WIRELESS AD HOC NETWORKS USING COST-BASED SCHEMES
    Azer, Marianne Amir
    El-Kassas, Sherif Mohammed
    El-Soudani, Mady Saiid
    SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 69 - +
  • [4] An approach to mitigate wormhole attack in wireless ad hoc networks
    Lee, Gunhee
    Kim, Dong-kyoo
    Seo, Jungtaek
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 220 - +
  • [5] Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [6] A Novel Scheme for Preventing Wormhole Attacks in Wireless Ad Hoc Networks
    Shi, Fei
    Song, JooSeok
    Liu, Weijie
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND SECURITY (ITS 2010), 2010, : 15 - 20
  • [7] Severity Analysis and Countermeasure for the Wormhole Attack in Wireless Ad Hoc Networks
    Khabbazian, Majid
    Mercier, Hugues
    Bhargava, Vijay K.
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (02) : 736 - 745
  • [8] Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks
    Azer, Marianne A.
    El-Kassas, Sherif M.
    El-Soudani, Magdy S.
    2009 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND NETWORKS COMMUNICATIONS (ICSNC 2009), 2009, : 30 - +
  • [9] Graph-Based Wormhole Attack Detection in Mobile Ad hoc Networks (MANETs)
    Rmayti, M.
    Begriche, Y.
    Khatoun, R.
    Khoukhi, L.
    Mammeri, A.
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [10] Wormhole Attack in Mobile Ad-hoc Networks
    Sharma, Madhu
    Jain, Ashish
    Shah, Shweta
    2016 SYMPOSIUM ON COLOSSAL DATA ANALYSIS AND NETWORKING (CDAN), 2016,