Statistical Wormhole Detection in Sensor Networks
- 562 Downloads
In this paper, we propose two mechanisms for wormhole detection in wireless sensor networks. The proposed mechanisms are based on hypothesis testing and they provide probabilistic results. The first mechanism, called the Neighbor Number Test (NNT), detects the increase in the number of the neighbors of the sensors, which is due to the new links created by the wormhole in the network. The second mechanism, called the All Distances Test (ADT), detects the decrease of the lengths of the shortest paths between all pairs of sensors, which is due to the shortcut links created by the wormhole in the network. Both mechanisms assume that the sensors send their neighbor list to the base station, and it is the base station that runs the algorithms on the network graph that is reconstructed from the received neighborhood information. We describe these mechanisms and investigate their performance by means of simulation.
KeywordsSensor Network Short Path Sensor Node Wireless Sensor Network Medium Access Control Protocol
Unable to display preview. Download preview PDF.
- 3.Čapkun, S., Buttyán, L., Hubaux, J.-P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the ACM Workshop on Security in Ad Hoc and Sensor Networks, SASN (2003)Google Scholar
- 4.Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Proceedings of the IEEE Symposium on Network and Distributed System Security, NDSS (2004)Google Scholar
- 5.Hu, Y., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless ad hoc networks. In: Proceedings of the IEEE Conference on Computer Communications, Infocom (2003)Google Scholar
- 7.Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. ACM Wireless Networks (to appear)Google Scholar
- 8.Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: Proceedings of the ACM Workshop on Wireless Security, WiSe (2004)Google Scholar