Statistical wormhole detection and localization in delay tolerant networks

Delay Tolerant Network (DTN) is a paradigm developed to cope with intermittent connectivity in wireless networks. Wireless networks are vulnerable to a variety of attacks, including wormhole attack. This paper proposes a statistical approach using infrastructure nodes to detect the presence of wormhole and localize the wormhole endpoints placement. The simulation results demonstrate that our mechanism is more effective than the related method called prohibited topology method, especially in high-speed network such as vehicular DTNs. The performance is independent of network density and node transmission range while there is a trade-off in performance when varying parameters namely node pause time and detection threshold.

[1]  Yih-Chun Hu Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .

[2]  Baek-Young Choi,et al.  Statistical wormhole detection for mobile sensor networks , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[3]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[5]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[6]  Mooi Choo Chuah,et al.  Detecting wormhole attacks in delay-tolerant networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[7]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[8]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[10]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[11]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[12]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[13]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[14]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.