TY - GEN
T1 - Wormholes no more? Localized Wormhole Detection and Prevention in Wireless Networks
AU - Tassos, Dimitriou
AU - Giannetsos, Athanasios
N1 - International Conference on Distributed Computing Systems Workshop. Proceedings. ISSN 1533-9610
PY - 2010
Y1 - 2010
N2 - A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful for real-world scenarios. Most importantly, however, the algorithm can always prevent wormholes, irrespective of the density of the network, while its efficiency is not affected even by frequent connectivity changes. We also provide an analytical evaluation of the algorithm’s correctness along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.
AB - A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antennas. In this work, we introduce a novel approach for detecting wormhole attacks. The proposed algorithm is completely localized and works by looking for simple evidence that no attack is taking place, using only connectivity information as implied by the underlying communication graph, and total absence of coordination. Unlike many existing techniques, it does not use any specialized hardware, making it extremely useful for real-world scenarios. Most importantly, however, the algorithm can always prevent wormholes, irrespective of the density of the network, while its efficiency is not affected even by frequent connectivity changes. We also provide an analytical evaluation of the algorithm’s correctness along with an implementation on real sensor devices that demonstrates its efficiency in terms of memory requirements and processing overhead.
U2 - 10.1007/978-3-642-13651-1_24
DO - 10.1007/978-3-642-13651-1_24
M3 - Conference article in Journal
SN - 0302-9743
VL - 6131
SP - 334
EP - 347
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
ER -