LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks

  • Authors:
  • Issa Khalil;Saurabh Bagchi;Ness B. Shroff

  • Affiliations:
  • Dependable Computing Systems Lab (DCSL), Center for Wireless Systems and Applications (CWSA), School of Electrical and Computer Engineering, Purdue University, 204-16 Airport Road, West Lafayette, ...;Dependable Computing Systems Lab (DCSL), Center for Wireless Systems and Applications (CWSA), School of Electrical and Computer Engineering, Purdue University, 204-16 Airport Road, West Lafayette, ...;Dependable Computing Systems Lab (DCSL), Center for Wireless Systems and Applications (CWSA), School of Electrical and Computer Engineering, Purdue University, 204-16 Airport Road, West Lafayette, ...

  • Venue:
  • Computer Networks: The International Journal of Computer and Telecommunications Networking
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In multihop wireless systems, such as ad hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This can either disrupt route establishment or make routes pass through the malicious nodes. In this paper, we present a lightweight countermeasure for the wormhole attack, called LiteWorp, which relies on overhearing neighbor communication. LiteWorp is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LiteWorp is applied is negligible compared to the loss in an unprotected network. Simulation results bring out the configuration where no framing is possible, while still having high detection rate. Analysis is done to show the low resource consumption of LiteWorp, the low detection latency, and the likelihood of framing by malicious nodes.