Transmission Time-Based Mechanism to Detect Wormhole Attacks

Important applications of Wireless Ad Hoc Networks make them very attractive to attackers, therefore more research is required to guarantee the security for Wireless Ad Hoc Networks. In this paper, we proposed a transmission time based mechanism (TTM) to detect wormhole attacks - one of the most popular & serious attacks in Wireless Ad Hoc Networks. TTM detects wormhole attacks during route setup procedure by computing transmission time between every two successive nodes along the established path. Wormhole is identified base on the fact that transmission time between two fake neighbors created by wormhole is considerably higher than that between two real neighbors which are within radio range of each other. TTM has good performance, little overhead and no special hardware is required.

[1]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[2]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[3]  Wenke Lee,et al.  Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.

[4]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Francesco Tiezzi,et al.  A WSDL-Based Type System for WS-BPEL , 2006, COORDINATION.

[6]  Hairong Yu,et al.  A service-oriented architecture for financial business processes , 2007, Inf. Syst. E Bus. Manag..

[7]  Szilveszter Juhos,et al.  Post Docking Filtering Using Cartesian Genetic Programming , 2003, Artificial Evolution.

[8]  Amitabh Mishra,et al.  Intrusion detection in wireless ad hoc networks , 2004, IEEE Wireless Communications.

[9]  David S. Goodsell,et al.  Automated docking using a Lamarckian genetic algorithm and an empirical binding free energy function , 1998 .

[10]  Hai Jin ChinaGrid: Making Grid Computing a Reality , 2004, ICADL.

[11]  Chai-Keong Toh,et al.  Ad Hoc Mobile Wireless Networks , 2002 .

[12]  Young-Koo Lee,et al.  An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.

[13]  Jerry Zeyu Gao,et al.  Measuring Component-Based Systems Using a Systematic Approach and Environment , 2006, 2006 Second IEEE International Symposium on Service-Oriented System Engineering (SOSE'06).

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  A. Sali,et al.  Comparative protein structure modeling of genes and genomes. , 2000, Annual review of biophysics and biomolecular structure.

[16]  Irene T Weber,et al.  Structure based drug design for HIV protease: from molecular modeling to cheminformatics. , 2007, Current topics in medicinal chemistry.

[17]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[18]  W. Graham Richards,et al.  Virtual screening using grid computing: the screensaver project , 2002, Nature Reviews Drug Discovery.

[19]  D. Diller,et al.  Kinases, homology models, and high throughput docking. , 2003, Journal of medicinal chemistry.

[20]  Lijun Qian,et al.  Detecting and locating wormhole attacks in wireless ad hoc networks through statistical analysis of multi-path , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[21]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[22]  Yih-Chun Hu,et al.  Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.

[23]  Jane Zhen,et al.  Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.

[24]  Johannes H. Voigt,et al.  Comparison of the NCI Open Database with Seven Large Chemical Structural Databases , 2001, J. Chem. Inf. Comput. Sci..

[25]  Liang Chen,et al.  Grid Service Orchestration Using the Business Process Execution Language (BPEL) , 2005, Journal of Grid Computing.

[26]  Karl N. Levitt,et al.  A specification-based intrusion detection system for AODV , 2003, SASN '03.

[27]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[28]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[29]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[30]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.