Securing DSR against wormhole attacks in multirate ad hoc networks

A wormhole attack is one of the hardest problems to detect whereas it can be easily implanted in any type of wireless ad hoc network. A wormhole attack can easily be launched by the attacker without having knowledge of the network or compromising any legitimate nodes. Most existing solutions either require special hardware devices or make strong assumptions in order to detect wormhole attacks which limit the usability of these solutions. In this paper, we present a security enhancement to dynamic source routing (DSR) protocol against wormhole attacks for ad hoc networks which relies on calculation of round trip time (RTT). Our protocol secures DSR against a wormhole attack in ad hoc networks for multirate transmissions. We also consider the processing and queuing delays of each participating node in the calculation of RTTs between neighbors which to date has not been addressed in the existing literature. This work provides two test cases that show that not taking multirate transmission into consideration results in miss identifying a wormhole attack.

[1]  Yih-Chun Hu,et al.  A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.

[2]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[3]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Jean-Philippe Babau,et al.  Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[5]  Dezun Dong,et al.  Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks , 2009, ICNP.

[6]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[7]  Jean-Marc Robert,et al.  Preventing Layer-3 wormhole attacks in ad-hoc networks with multipath DSR , 2009, 2009 8th IFIP Annual Mediterranean Ad Hoc Networking Workshop.

[8]  Ming-Yang Su,et al.  WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks , 2010, Comput. Secur..

[9]  Adel Saeed Alshamrani PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.

[10]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007 .

[11]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[12]  Helmut Kurth,et al.  Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.

[13]  Heejo Lee,et al.  Transmission Time-Based Mechanism to Detect Wormhole Attacks , 2007, The 2nd IEEE Asia-Pacific Service Computing Conference (APSCC 2007).

[14]  G. Vinitha,et al.  An Approach Towards Detection of Wormhole Attack in Sensor Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.

[15]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[16]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[17]  Lei Guo,et al.  Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.

[18]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[19]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[20]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[21]  Majid Khabbazian,et al.  NIS02-1: Wormhole Attack in Wireless Ad Hoc Networks: Analysis and Countermeasure , 2006, IEEE Globecom 2006.

[22]  Lakhmi C. Jain,et al.  Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..

[23]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.