首页 | 本学科首页   官方微博 | 高级检索  
     


LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks
Affiliation:1. Public Research Centre Henri Tudor, 6 avenue des Hauts-fourneaux, L-4362 Esch-sur-Alzette, Luxembourg;2. LRI, University of Paris-Sud XI, Bât 650, 91405 Orsay Cedex, France;1. School of Software, Dalian University of Technology, 116621, Dalian, China;2. 531, Jiangcheng Avenue, Wuhan Economic & Technological Development Zone,430056, China;1. Department of Mathematics and Mechanics, Saint Petersburg University, St. Petersburg, Russia;2. School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, Australia
Abstract:In multihop wireless systems, such as ad hoc and sensor networks, the need for cooperation among nodes to relay each other’s packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This can either disrupt route establishment or make routes pass through the malicious nodes. In this paper, we present a lightweight countermeasure for the wormhole attack, called LiteWorp, which relies on overhearing neighbor communication. LiteWorp is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LiteWorp is applied is negligible compared to the loss in an unprotected network. Simulation results bring out the configuration where no framing is possible, while still having high detection rate. Analysis is done to show the low resource consumption of LiteWorp, the low detection latency, and the likelihood of framing by malicious nodes.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号