Statistical wormhole detection for mobile sensor networks

A wormhole attack is one of the most challenging yet detrimental security issues in mobile wireless sensor networks (mWSNs). However, as most of the existing countermeasures are designed mainly for fixed WSNs using hardware devices or information of entire WSNs (topology or statistical), they cannot be effectively used in mWSNs. In this paper, we propose, Statistical Wormhole Apprehension using Neighbors (SWAN), a novel wormhole countermeasure for mWSNs. As SWAN utilizes the localized statistical neighborhood information collected by mobile nodes, it apprehends wormholes not only without requiring any special hardware device but also without causing significant communication and coordination overhead. We performed extensive studies on false positive and detection rates via both analysis and simulations. Our simulation results show that SWAN can detect wormhole attacks with high probabilities and very low false positive rates.

[1]  Wei Wang,et al.  Using mobile relays to prolong the lifetime of wireless sensor networks , 2005, MobiCom '05.

[2]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[3]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[4]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[5]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[6]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[7]  Jie Chen,et al.  A Statistical Change Point Model Approach for the Detection of DNA Copy Number Variations in Array CGH Data , 2009, IEEE ACM Trans. Comput. Biol. Bioinform..

[8]  S. Muthukrishnan,et al.  Surfing Wavelets on Streams: One-Pass Summaries for Approximate Aggregate Queries , 2001, VLDB.

[9]  David Tse,et al.  Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[10]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[11]  Sudipto Guha,et al.  Approximating a data stream for querying and estimation: algorithms and performance evaluation , 2002, Proceedings 18th International Conference on Data Engineering.

[12]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[13]  Panagiotis Papadimitratos,et al.  Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.

[14]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[15]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[16]  David W. Scott,et al.  Multivariate Density Estimation: Theory, Practice, and Visualization , 1992, Wiley Series in Probability and Statistics.

[17]  D. W. Scott,et al.  Multivariate Density Estimation, Theory, Practice and Visualization , 1992 .

[18]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[19]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[20]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[21]  Yunhao Liu,et al.  WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.

[22]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[23]  Yurong Xu,et al.  Analysis of range-free anchor-free localization in a wsn under wormhole attack , 2007, MSWiM '07.

[24]  Ozan K. Tonguz,et al.  Impact of mobility on the performance of ad hoc wireless networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).