SWAT: A Decentralized Self-Healing Mechanism for Wormhole Attacks in Wireless Sensor Networks

This paper proposes and evaluates a decentralized self-healing mechanism that detects and recovers from wormhole attacks in wireless multi-hop sensor networks. Upon detecting a wormhole attack, the proposed mechanism, called SWAT, identifies the locations of malicious nodes (or wormhole nodes), isolates them from the network and recovers the routing structure distorted by them. SWAT is the first mechanism that performs both wormhole node isolation and routing structure recovery against wormhole attacks. Unlike many other wormhole detection mechanisms, SWAT does not require any extra networking facilities (e.g., timing analysis and localization facilities) as well as special hardware (e.g., GPS). Instead, it uses network connectivity information only in a decentralized manner. Simulation results show that SWAT yields 100% wormhole attack detection, 0% false detection, 100% wormhole node isolation and 0% false isolation in dense networks. The results also show that SWAT outperforms multi-path routing mechanisms in terms of control overhead and power consumption and outperforms another connectivity-based detection mechanism in terms of false isolation rate and recovery efficiency.

[1]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[2]  Maria A. Gorlatova,et al.  Review of Existing Wormhole Attack Discovery Techniques , 2006 .

[3]  David L. Mills A Precision Radio Clock for WWV Transmissions , 2004 .

[4]  Chia-Mei Chen,et al.  Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[5]  Matt Welsh,et al.  Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.

[6]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[7]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[8]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[9]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[10]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[11]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[12]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[13]  F. Makedon,et al.  Distributed Wormhole Attack Detection in Wireless Sensor Networks , 2007 .

[14]  David E. Culler,et al.  TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.

[15]  Yurong Xu,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2007, Critical Infrastructure Protection.

[16]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[17]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[18]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[19]  Weichao Wang,et al.  Interactive Wormhole Detection and Evaluation , 2007, Inf. Vis..

[20]  Chuang Lin,et al.  Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-Hoc Networks , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing (GCC'06).

[21]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[22]  David L. Mills A Computer-Controlled LORAN-C Receiver for Precision Timekeeping , 1998 .

[23]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[24]  Yih-Chun Hu,et al.  Wormhole Detection in Wireless Ad Hoc Networks , 2002 .

[25]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[26]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.