Distributed Wormhole Attack Detection in Wireless ...

4 downloads 173 Views 593KB Size Report
2Computer Science Department, UMass Lowell ... passive, this algorithm uses a hop-counting tech- nique as a ... which may be useful information for further de-.
Distributed Wormhole Attack Detection in Wireless Sensor Networks

Yurong Xu1 Guanling Chen2 James Ford1,3 Fillia Makedon1,3 1

Computer Science Department, Dartmouth College {yurong, jford, makedon}@cs.dartmouth.edu 2

Computer Science Department, UMass Lowell {glchen}@cs.uml.edu

3

Univ. of Texas at Arlington, Dept. of Computer Science and Eng. {Makedon,jford}@cse.uta.edu

Abstract

ployed in some hostile environment, attacks (especially those like wormhole attacks that don’t need

This paper proposes a distributed wormhole to capture the keys used in the network) may affect detection algorithm for wireless sensor networks, current sensor networks and may even disable a potential technology for infrastructures of many their functions. This paper proposes a distributed applications. Currently, most sensor networks wormhole detection algorithm called Wormhole assume they will be deployed in a benign enviGeographic Distributed Detection (WGDD), that ronment; however, when a sensor network is de-

is based on detecting disorder of the networks

capabilities. This technology has the potential

which is caused by the existence of a wormhole

to provide infrastructures for numerous applica-

inside the network. Since wormhole attacks are

tions, such as surveillance, healthcare, industry

passive, this algorithm uses a hop-counting tech-

automation, and military uses.

nique as a probe procedure to detect wormhole attacks, then reconstructs local maps in each node, and after that, uses a feature called “diameter” to detect abnormalities caused by wormholes. The main advantage of using a distributed wormhole detection algorithm is that such an algorithm can provide the approximate location of a wormhole, which may be useful information for further defense mechanisms. Simulations show that the proposed detection method has both a low False Tol-

Currently, most applications in WSNs assume that they are deployed in a trusted environment, but it is possible that a WSN is to be deployed in an untrusted environments, and so dealing with security issues will become a central requirement. In this situation, an adversary can disable the functionality of a WSN by interfering with packet transmissions inside the networks with different attacks such as wormhole attacks, sybil attacks [12], jamming, and packet injection attacks [17].

eration Rate (FTR) and a low False Detection Rate (FDR) in detecting wormhole attacks.

This paper focuses on wormhole attack detection [2, 7, 13]. A wormhole attack doesn’t require knowing the cryptographic infrastructure of

1. Introduction the sensor network, and thus it puts an attacker in Wireless Sensor Networks (WSNs) [1, 15] are

a very powerful position relative to other nodes

an emerging technology consisting of small, low-

in the network, compared to other attacks such

power, and low-cost devices that integrate limited

as sybil and packet injection attacks, which usu-

computation, sensing, and radio communication

ally utilize vulnerabilities in the infrastructure of

wireless sensor networks. An attacker can perform a wormhole attack on a sensor network even if the network communication infrastructure provides confidentiality and authenticity, and the attacker does not have any cryptographic keys.

Currently, there are many methods that have been proposed for detecting wormhole attacks inside of ad hoc networks and wireless sensor networks, and encouraging results have been obtained. However, these methods usually require that some nodes in the network be equipped with special hardware. Solutions such as SECTOR [2] and “Packet Leashes” [7] need time synchronization or highly accurate clocks to detect wormholes; the method of Hu and Evans [5] requires that a directional antenna is deployed in each node; and LAD [3], SerLoc [9], and the approach in [6] concentrate on detecting/defending against wormholes in localization in WSNs, but these methods also need the help of anchor nodes (which are special nodes that already know their location exactly), which requires manual setup

when a network is deployed. In comparison with the above methods, in this paper we describe a distributed method called Wormhole Geographic Distributed Detection (WGDD) to detect a wormhole attack without using anchor nodes or any additional hardware. Since a wormhole attack is passive, this algorithm uses a simple hop-counting technique as a probe procedure to detect wormhole attack, then reconstructs local maps by MDS (Multidimensional Scaling) in each node, and after that uses a feature introduced in this papce called “diameter” to detect distortions caused by a wormhole. The main advantage of using a distributed wormhole detection algorithm is that such an algorithm can provide the approximate location of a wormhole, which can assist further defense mechanisms. Simulation shows that the proposed detection method has both a low False Toleration Rate(FTR) and a low False Detection Rate(FDR) in detecting wormhole attacks. In this paper, we make the following contribu-

tions. (i.) We propose a new feature which can be

2. Related Work

used to detect wormholes in a distributed scheme. (ii.) We propose a distributed wormhole detection algorithm which needs only local connectivity information. Since the detection of wormholes is completed under a distributed scheme, it is possible that our algorithm can provide the approximate locations of the ends of wormholes, which will be helpful in further defense against wormhole attacks. (iii) We provide extensive simulation for (i-ii) in NS-2, which shows that our methods are effective at detecting wormhole attacks on different network placements.

The wormhole attack detection in wireless adhoc networks was introduced in [2, 6, 7]. Both solutions are referred to as “Packet Leashes” [7], and SECTOR [2]. They detect wormhole attacks based upon the notion of geographical or temporal leashes. Briefly, suppose every node in the network already knows its exact location and each node embeds its location and a timestamp into each packet it sends. If the network is synchronized, then other nodes receiving that packet can detect a wormhole by detecting the mismatch between the timestamp difference they calculate and

The remainder of the paper is organized as fol-

the location difference they observe. Such a solu-

lows. Section 2 discusses related work. Sec-

tion requires a synchronized clock and preknown

tion 3 describes some basic concepts related to

location for each node. The method we propose

wormhole attacks. Section 4 discusses the fea-

here does not have these requirements.

ture which detects wormholes inside of a network

In [8], Kong et al. study Denial of Service

and the details of the WGDD algorithm. Section

(DoS) attacks, including wormhole attacks, in

5 evaluates the algorithm in an NS-2 simulation

UWSN (Under Water Sensor Networking). Be-

environment. And finally Section 6 gives our con-

cause UWSN typically uses acoustical methods

clusions.

to propagate messages under water, the methods

in UWSN can’t be directly applied into wireless

anchor nodes that are close to a end of a worm-

sensor networks.

hole, SeRLoc will still have difficulty in detecting/defending against wormhole attacks.

In [5], Hu and Evans utilize directional antennas to prevent wormhole links by assuming every node of the network will be equipped with directional antennas that all have the same orientation. Lazos and Poovendran apply a similar idea in designing a secure localization scheme called SeRLoc [9] that protects against wormhole attacks in localization. In SeRLoc, there are about 400 anchor nodes (designated as “beacon nodes” in the paper) deployed in a 5000-node network. Each anchor node has a directional antenna and already knows its physical location. Other nodes in the network use these anchor nodes to locate themselves. When there is a wormhole attack in the network, since a wormhole will shortcut the network, directional antennas deployed in the anchor nodes will help in detecting the attack, and the nodes can then defend against it by discard-

In more recent papers [3, 10], D. Liu et al. proposed an anchor-based scheme which is resistant to several attacks, including wormhole attacks. By using a hop-counting technique, the scheme estimates the distance between a node and an anchor node (or “location reference” in the authors’ terminology). If there is a wormhole inside the network, then it is possible that the distance from a node to some anchor node will be changed, and a simple threshold method is used to determine whether such a distance difference is caused by a wormhole attack or by localization error. The main difference between our method and those of [3] and [10] is that the latter methods rely on anchor nodes, which need manual setup in advance, while our method does not require any anchor nodes to detect wormholes.

ing incorrect localization messages. However, if

Additional work by [14] presents a useful graph

anchor nodes are compromised, especially those

theoretic framework for modeling of wormhole

attacks, but this theoretic framework is based on

which is identified in [14], is that such a visual-

the assumption that there are “guard nodes” know

ization cannot be applied to networks with irreg-

their locations exactly. Thus, these nodes actu-

ular shapes, such as a string topology (nodes con-

ally work as anchor nodes as described in this pa-

nected in one line).

per. Since in this work we assume that none of the nodes in the network knows its physical location,

3. The Wormhole Attack

our proposed solution is for a case not covered by this framework. Origin end

MDS-VOW [16] allows visualization of a net-

Wormhole tunnel Destination end

Figure 1. A Wormhole Attack in a WSN

work to allow detection of wormholes by finding bending distortions caused by a wormhole in

In a typical wormhole attack, an attacker re-

computed maps. The main difference between

ceives packets at one point in the network, for-

our approach and MDS-VOW is that MDS-VOW

wards them through a wireless or wired link with

can only work in a centralized scheme, so MDS-

much less latency than the default links used by

VOW needs to have a central computer to finish

the network and relays those packets at another

its computation. In our paper, we extract a new

position in the network. In this paper we as-

feature which can efficiently indicate the ends of

sume that a wormhole is bidirectional, and when

a wormhole based only on local bending distor-

considering a wormhole attack, we refer to the

tions caused by the ends of the wormhole. The

end of that wormhole receiving a message as the

algorithm described in this paper is computed by

“origin end” of the wormhole and the end that

a distributed scheme and requires no centralized

transmits the message as the “destination end” of

computation. A general limitation of MDS-VOW,

that wormhole (thus which end is which is en-

tirely context dependent). Figure 1 shows a typ-

similar hop-counting technique as a probe proce-

ical wormhole attack. In this work we assume

dure (Section 4.2) to detect wormhole attack. Af-

wormholes with two endpoints, although in the-

ter the running of the probe procedure, each node

ory multi-end wormholes are possible.

will collect the set of hop-count from its neigh-

We also assume that each wormhole in a net-

bor nodes which are in one(k) hop(s) distance to

work is (1) passive, and thus does not send out

it, then that node will run Dijkstra’s algorithm to

any message without any inbound message, (2)

get the shortest path for each pair of the nodes,

static, which means that such wormhole will not

after that, it will reconstruct a local map by MDS

move around.

(Multidimensional Scaling) (Section 4.3). After we discuss a feature called as “diameter” to de-

4

Detecting Wormhole Attacks

tect distortions caused by a wormhole in local maps in Section 4.4, we will introduce the detec-

In this section, at first, we will describe our altion procedure in Section 4.5. The overview of gorithm in brief, then, by observing the network this Wormhole Geographic Distributed Detection with a wormhole inside it, we discuss a feature (WGDD) algorithm can be seen in Procedure 1. which can be used to detect wormhole attacks in distributed scheme, at last, based on the previous feature we propose how to detect wormhole at-

Procedure 1 Wormhole Geographic Distributed Detection (WGDD) 1: Probe Procedure 2: Local Map Computation Procedure 3: Detection Procedure

tacks.

4.1

Overview of WGDD Algorithm

4.2

Probe Procedure

Our distributed algorithm called Wormhole Ge-

Since a wormhole attack is passive, which

ographic Distributed Detection (WGDD) uses a

means that such an attack can only happen when

there is some message being transmitted near the

procedure [18] for node a is shown in Procedure

wormhole area. In order to detect whether there

2.

is a wormhole attack inside a network, we design a probe procedure to flood an message from some bootstrap node to the whole networks to let all other nodes in the network to count the hop distance from itself to that bootstrap node. Such probe procedure is based on hop-coordinates [18] technique to measure the hop distance from each node to some bootstrap node, which shares the same idea as hop-counting, but has more accurate measurement.

Procedure 2 Probe Procedure in node a 1: INPUT: message (hopb ) from node b ∈ Na 2: for message (hopb ) from any B ∈ Na and not TIMEOUT do 3: if hopb < hopa then 4: hopa = hopb + 1 5: forward (message(hopa ) ) to MAC 6: else 7: drop (message(hopb ) ) 8: end if 9: end for 10: if |Na | == 0 then 11: offseta = 0 12: else P (hop −(hopa −1))+1 13: offseta = b∈Na 2(|Nb a |+1) 14: end if 15: return hopa and offseta

(i)In bootstrap node: A bootstrap node x creates a probe message with (i = idx ) to flood the network. After that, the bootstrap node will drop any probe message that was originated by itself. The bootstrap node has the hop-coordinate: hopx = 0 and offsetx = 0.

Here, a is a node, hopa is the minimum number of hops to reach node a counting from some bootstrap node (x), the initial value of it will be the largest positive value in practice. the combi-

(ii) In all other nodes in the WSN: Suppose that

nation of hopa and offseta is the hop coordinate for

a node a is calculating its hop distance, and node

node a, Na is a set of nodes which can be reached

b is one of the neighbors of node a. Then the basic

by node a in one hop, and |Na | is the number of

probe procedure 2 is as same as hop-coordinates

nodes in Na .

0 10

144 140

90

144 140 80 70

120

60

120 50 40

100

30

100 20

60

60

40

40

20

20

0 0

80

10

80

10 20 30 40 50 60 70 80 90

20

40

60

80

100

120

140 144X

0

0

20

40

60

0 10

0 0

80

100

120

140 144

(a) The original location of a 2500node (b) the same 2500-node WSN with one WSN with one wormhole wormhole siting on the edges of the WSN Figure 2. a 2500-node WSN (r = 2m) with one wormhole

4.3

(|N a |+1)×(|N a |+1) shortest path matrix (here

Local Map Computation

|N a | is the number of nodes that can be reached by In this step, each node will compute a local map for it’s neighbors based on the hop-coordinate computed in the previous step. After the gener-

node A in one (k) hop(s)) and retain the first two (or three) largest eigenvalues and eigenvectors to construct a 2-D (or 3-D) local map.

ation of hop-coordinates with Procedure 2, each The total cost for this step is a computational node will send a request to its neighbor nodes that

cost of O(|Na |3 n) and a memory cost of O(|Na |2 )

are within one(k) hop(s) to send back their hop per node, with no communication cost in this step. coordinate from some bootstrap node (x). After each node receives the hop coordinate

4.4

Detection Procedure

from its neighbors, that node will compute shortest paths between all pairs of nodes one (k) hop(s)

Based on the local map from previous step,

to that node, using Dijkstra’s algorithm or other

here we will try to detect attacks. At first let us

similar algorithms.

have a look of the affection of wormhole attack

Then,

we

apply

MDS

to

the

on computed map.

4.4.1

Observation of a Wormhole in a Recon-

ing on the edges of the network.

structed Map

In order to observe a wormhole, we implemented the probe procedure 2 and the local map compu-

4.4.2

New Feature to Detect Wormhole Attacks

tation procedure as routing agents and the boot-

With the fact that each WSN node has limited re-

strap node for the probe procedure as a protocol

sources and has no possibility to store global in-

agent in NS-2 version 2.29 [11] with 802.15.4

formation, in order to detect wormholes in a dis-

MAC layer [19] and CMU wireless extensions

tributed scheme, each node can only use local in-

[4]. The configuration parameters used for NS-2

formation to detect wormhole attacks.

are RF range = 15 meters, propagation = TwoRayGround, and antenna = Omni Antenna.

Consider the two parts of the intruded network with a wormhole with two ends in Figure 3, by se-

In our first experiment, we used 2500 nodes in a

lecting two parts of the network which is close to

uniform placement— total 2500 nodes are placed

the ends of the wormhole in Figure 2(a). We use a

on a grid with ±0.5r randomized placement error,

dotted circle to represent the neighbor area where

where r = 2 m is the width of a small square in

a particular node can directly reach in transmis-

the grid. A wormhole is implemented as a wired

sion range R, since there are two ends, we shows

connection.

two parts of the network. Then, after the cir-

Fig. 2(a) and 2(b) shows the same sensor net-

cled node finished local map computation for the

work; each ‘x’ represents a node, and the red cir-

nodes in its local range, it will be getting a lo-

cles indicate the two ends of a wormhole; in Fig.

cal map as in Figure 4. From this figure, we can

2(a), the wormhole is siting in the center of the

see that because wormhole shortcuts the two parts

network, while in Fig. 2(b), the wormhole is sit-

of the network, the circled node can reach more

range than before (if we measure the longest dis-

as distancde(a, b) = sqrt((x − x0 )2 + (y − y 0 )2 )

tance in this local map, it will equal 49m), though

in 2D case, here (x, y),(x0 , y 0 ) are the coordiantes

that computed local map is bended by the effect

for node a, b in the local map computed in the

of the wormhole.

previous step, respectively. Theoretically, the diameter of the neighbor area for a node will roughly equal or less its trans-

Figure 3. Two Parts of the Network near Wormhole Ends.Here, parameters: r = 4,

R = 15, red circles represents the wormhole ends.

mission range R, since one node only can hear from its neighbors within the transmission range R. But because of the shortcut of wormhole, the computed map for that neighbor area of that node will be distorted, and so the diameter of that com-

2d =49m Figure 4. Local Map in the Red Circled Node in Figure 3.After probe procedure and local

map computation in that node which is red circled.

puted local map will be larger than the physical one, as shown in 4, we can see 2d = 49m. In order to verify whether such diameter feature is working in detecting wormhole in the whole

From the above observation, we instead fo-

network, we compute the diameter for each node

cus on detecting wormholes by using a different

in the same 2500-node network with and without

feature—the diameter of the computed local map.

wormhole. The results are shown in Figure 5(a),

We define diameter d for Node a here:

if we examine nodes that are very near to a worm-

Diameter: d = max(distance(b, c))/2,

hole, such as the area near the red circles in Fig-

Where b, c ∈ Na , here Na is the set of neighbor

ure 5(b), the diameters of the local maps for these

nodes of node a, distance(a, b) will be computed

nodes will be noticeably increased by proximity

26 24 22

17

Diameter

Diameter

16 15 14

20 18 16

13 0

100 20

80 40

14

60 60

40 80

20 0100

12 100

80

60

X

40

20

100 0

80

60

40

Y

20

0

(a) Diameter Measurement in the 2500-node (b) Diameter Measurement in the 2500-node WSN in Figure 2.(a) without Wormhole WSN in Figure 2.(a) with a Wormhole Figure 5. Diameter Measurement without and with Wormhole in a 2500-node WSN. In Figure 5(b),

the diameter of a local map will roughly be R (from 14 to 18, while R = 15 meters) unless there is a wormhole attack, in which case the diameter of a local map will become longer as the position draws closer and closer to the wormhole.

to the wormhole, comparing the diameters in the

longer as the position draws closer and closer to

same nodes in the network without wormhole in

the wormhole. The diameter reaches the highest

Figure 5(a). But if the nodes are a little farther

(about 25 m) at the nodes at about 7 m to the ends

away, or in a distant part of the network, such as

of wormhole, then the diameter is decreased, be-

the middle area in Figure 5(b), the diameters of

cause the nodes are approaching to the edges of

the local maps for these nodes, will be almost as

the network, but still above 22 m.

normal as these in the same area in Figure 5(a), which is without wormhole.

The ‘diameter’ feature is also good at detect wormhole attack in networks with irregular

In Figure 5(b), the diameter of a local map will

shapes, and in networks with multiple wormholes

roughly be R (from 14 to 18, while R = 15 me-

inside them. We did some experiments of ‘diam-

ters) unless there is a wormhole attack, in which

eter’ in a network with string topology, and a net-

case the diameter of a local map will become

work with two wormholes inside it.

16.8

26

16.6

24 22

16.2

Diameter

diameter

16.4

16 15.8

20 18 16

15.6

14

15.4

12

15.2 0

20

40

60

X

80

100

(a) Diameter Measurement in the 50node WSN in String Placement without a Wormhole

0

20

40

60

X

80

100

(b) Diameter Measurement in the 50node WSN in String Placement with a Wormhole

Figure 6. Diameter Measurement in the 50-node WSN in String Placement without/with a Wormhole

In a string topology experiment, we tested a

2.a. The measurement of diameter for all nodes

50-node network, inside of which, each node are

as shown in Figure 7. The locations of the ends

uniformally distributed in a 100 meter string in

of these two wormholes are represented as red

one dimension. First we measure the diameter for

circles in the same figure. From the figure, we

each node without any wormhole in the network,

can see that even two wormholes are very close

the result is in Figure 6(a). The diameter is at most

to each other, the peaks of diameter are still ap-

16.8 m in Figure 6(a). Then, we add a wormhole

peared in the nodes which are close to the ends of

into the network with the two ends of that worm-

the wormholes, from our measurement, four peak

hole at the two ends of the string. We can see that

values are 24.8, 25.2, 22.2, 22.6 m respectively.

right now, the diameters of nodes which are close to the ends of the wormhole are larger than 22 m, shown in Figure 6(b).

So, by computing the diameter d for local map, such detection algorithm can runs independently in each node, in conjunction with the computation

In order to test the feature of ‘diameter’ in de-

of a local map for the neighboring area. Since

tecting multiple wormholes in a network, we de-

all nodes in this area are within one(k) hop(s) of

ployed two wormholes in the network of Figure

the calculating node, the detection algorithm can

to the ends of the wormhole will be higher to over 22m. So, we can define a threshold for the diameter to detect wormholes in the network. Since, the lower the value we assign to such threshold, the higher possibility it is that nodes send the error alarms of wormhole. So, based on the above experiments, we define a threshold as 1.4R (in our Figure 7. Diameter Measurement in the 2500node WSN in Figure 2.(a) with Two Wormholes.Here, red cycles are the ends of worm-

holes, the dashed lines are the tunnels of the wormholes. A ’X’ is represented as a node. The 50X50 mesh is only for visualization purpose. Color bar represents the value of diameter.

configuration 1.4R = 1.4 ∗ 15 = 21 m) to determine whether there is a wormhole attack present or not. In order to adjust the sensitivity of detection procedure we introduce a constant parameter λ:

compute the diameter of each local map after determining each neighbor node’s location.

Suppose the diameter of a local relative map is d; if d > (1+λ)1.4R (here λ is a constant parame-

4.4.3

Detection Procedure

Thus, we propose to use the diameter to determine whether there is a wormhole attack present or not. From the experiment in Figure 5(a) and 5(b), we can see that usually the diameters for lo-

ter which is less than 1 and larger than 0), then we can say there is a wormhole in the network, and if not, we can say that the error probably comes from localization error. The details of the detection algorithm follow.

cal maps will be around R, but if there is a worm-

Suppose node a is an arbitrary node in the

hole in the network, then the diameters of the lo-

WSN. At first, we propose a distributed detec-

cal maps which are computed by the nodes close

tion Procedure 3, which is used to compute the

diameter after running the probe procedure 2 and

[11] with 802.15.4 MAC layer [19] and CMU

local map computation in Section 4.3, and detect

wireless [4] extensions. The configuration used

whether there is a wormhole in the network.

for NS-2 is RF range = 15 meters, propagation =

Procedure 3 Wormhole Detection Procedure in node a 1: INPUT: local map G in node a for Na ∪ {a} 2: diameter d = 0 3: for each b ∈ Na ∪ {a} do 4: for each node c ∈ Na ∪ {a} − {b} do 5: if 2d < distance(b, c) in local map G then 6: 2d = distance(a, b) in local map G 7: end if 8: end for 9: end for 10: if d > (1 + λ) × 1.4R then 11: return “FOUND WORMHOLE” to sink node. 12: end if

TwoRayGround, antenna = Omni Antenna. We implemented a wormhole as a wired connection with smaller latency that forwards packets from one node to another node. 120

100

80

60

40

20

0

The total cost for this step is a computational cost of O(|Na |2 n) and a memory cost of O(|Na |) per node, with no communication cost in this

0

20

40

60

80

100

120

Figure 8. A typical placement for simulation (Constructed with n = 400, r = 4. green dashed ovals are holes and small blue circles are islands.)

step. In our all experiments, we used uniform

5. Simulations Results

placement—n nodes are placed on a grid with ±0.5r randomized placement error. Here r is the

5.1

Simulation Environment Setup

width of a small square in the grid. We conSame as to the experiment setup in the previous

structed a total of 60 placements with n = 400,

section, we implemented our whole detection al-

900, 1600 and 2500, and with r = 2, 4,6, 8, 10

gorithm as a routing agent in NS-2 version 2.29

and 12 meters, respectively. The reason we use

uniform placement with ±0.5r error is that usu-

In practice, we count the number of the nodes,

ally such placement produces both node holes and

which send out “FOUND WORMHOLE” mes-

islands in one placement, as demonstrated in Fig-

sages but are far away from the ends of a worm-

ure 8. The place of the wormhole is totally ran-

hole (We define that if a node is R = 15m away

domized inside of the network.

from all ends of a wormhole, then this node obviously has few impact of wormhole, and so we

5.2

Detection Simulation Result

say that such node is far away from the worm5.2.1

Metrics

hole.), into the “number of normal localization errors flagged as detected wormholes”. When FDR

As we decrease the value of λ, we can increase = 0, it means that there is no wrong alarm in dethe accuracy of detecting wormhole attack, but tecting wormholes. the possibility of fault alarm will be increased. In order to evaluate the accuracy of our wormhole attack detection under different λ values, we introduce the following concepts:

False Toleration Rate (FTR): the frequency with which the detection system falsely recognizes different characteristics as identical, thus failing to detect a wormhole attack.

False Detection Rate (FDR): the frequency with which the detection system falsely recognizes identical characteristics as being different, thus failing to tolerate, for example, a normal localization error.

FTR = (number of wormhole attacks not detected) / (total number of trials). If there is a wormhole in a experiment, but there is no node to send out “FOUND WORMHOLE”

FDR = (number of normal localization errors

messages, we will count this as “wormhole at-

flagged as detected wormholes) / (total number of

tacks not detects”. So, if FTR = 0, it means that

trials).

our detection algorithm is successful in detecting

0.1

0.09

0.09

0.08

0.08

0.08

0.07

0.07

0.07

0.07

0.06

0.06

0.06

0.06

0.05

0.05

0.05

0.05

0.04

0.04

0.04

0.04

0.03

0.03

0.03

0.03

0.02

0.02

0.02

0.01

0.01

0.01

FDR

0.08

FDR(%)

FTR

0

2

4

6

8

r (m)

10

12

0.02 0.01 0

0

0

0

FDR FTR

FTR(%)

0.1

0.09

FDR(%)

0.1

FTR(%)

0.1 0.09

0

15

2

(a) when λ = 0

4

6

8

r (m)

10

12

15

(b) when λ = 0.1

Figure 9. False Detection Rate (FDR) and False Toleration Rate (FTR) for various node spacings.

1

1 0.9

0.9

FDR FTR

0.8

0.8 0.7

5.2.2

Simulation Result

We use the same experimental setup as in section

FDR(%)

0.7 0.6

0.6

0.5

0.5

0.4

0.4

0.3

0.3

0.2

0.2

0.1

0.1 0

0 2

5.1, with one wormhole in each placement, again implemented in NS-2 as a wired connection with

FTR(%)

wormholes in all experiments.

7

12

17

22

27

32

37

Hop Distance Between Two Ends of a Wormhole

Figure 10. FTR/FDR vs Hop Distance Between Two Ends of a Wormhole (λ = 0)

a latency far less than the latency of the wireless connections. Results in terms of FTR and FDR are shown in Figure 9. Our detection algorithm

our algorithm to detect smaller wormholes (such

has a low FTR with FDR=0 when λ = 0.0as in

as two to three hops long), we plot the all FTR and

Figure 9.a; when λ = 0.1as in Figure 9.b, our

FDR experiment data( when λ = 0) on Figure 10

detection algorithm can achieve a low FDR with

based on the number of hops between two ends of

FTR=0.

a wormhole in one experiment. We can see that

In order to consider about the performance of

if it is a long wormhole such as ≥ 3 hops long,

our detection algorithm archives almost 100% de-

distortion in distributed scheme, with the help of

tection rate (shown as FTR = 0). Even when fac-

that feature– “diameter”, we propose a wormhole

ing shorter wormhols which are less than 3 hops

detection procedure.

long, our algorithm can still make more than 80% detection rate (shown as FTR < 20%).

We test our Wormhole Geographic Distributed Detection (WGDD) algorithm in simulation environment under different placements of networks.

6. Summary and Discussion

In this paper, we discuss how to detect wormhole attacks in distributed scheme. By assuming that wormhole attacks are passive, we provide a probe procedure to let some bootstrap node flood a probe message to detect some possible wormholes in the network, the probe procedure produces a hop-coordinates to each node which represents the hop distance from that node to the bootstrap node. Then each node will compute a local map for its neighbors and itself with the hopcoordinates collected in the previous step. Since

The extensive simulation result shows that our detection algorithm can archive almost 100% overall detection rate (shown as FTR is around zero, when λ = 0 in Figure 10.a). Even considering about the cases of shorter wormholes which are less than 3 hops long, our algorithm can still make more than 80% detection rate (shown as FTR < 20% in Figure 10). We can run our detection algorithm in stricter model by setuping λ = 0.1, it this case, we can archive almost zero wrong alarm rate (shown as FDR = 0 in Figure 10.b).

if there is a wormhole in the network, it causes

Since our algorithm is running under dis-

some distortions in some local maps of the nodes

tributed scheme, it means that if there is a worm-

which are close to the ends of the wormhole, so

hole, then some nodes close to the wormhole will

we find a feature called “diameter” to detect such

detect the wormhole attacks, so such advantage

of our algorithm may help in defending against

coordinate inside itself.

Such process will be

wormholes. We may propose the idea of freez-

ended until there is no node detects any wormhole

ing nodes that have detected wormhole attacks in

attack.

their vicinity, along with their neighbor nodes, in

Right now, we are basing experiment to decide

order to isolate and negate the effect of a worm-

the threshold and λ in deciding whether a diame-

hole.

ter measurement triggers an alarm for wormhole.

Suppose that the wireless range for a wormhole

One future work may need to improve our algo-

attack equals k times the transmission range R of

rithm is how to decide such threshold and λ auto-

a normal node; if this is the case, then it is possi-

matically.

ble that we can stop the transmission of a wormhole attack by freezing the nodes within k times

References

transmission range R of one detecting location. [1] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and

Procedure 4 Defending against wormhole attacks Require: triggered by DetectionProcedure 1: send message(freezing)to all neighbor nodes in 1(k) hop(s) 2: Broadcast message(relocalization) to the bootstrap node and other nodes.

E. Cayirci. A survey on sensor networks. Communications Magazine, IEEE, 40(8):102–114, 2002. ˇ [2] S. Capkun, L. Butty´an, and J. Hubaux. SEC-

From a node (or nodes), which detects worm-

TOR: secure tracking of node encounters in

hole attack, a special message will flood out

multi-hop wireless networks. Proceedings of the

to freeze neighboring nodes.

1st ACM workshop on Security of ad hoc and

If the bootstrap

node (x) receives this message, it will restart the

sensor networks, pages 21–32, 2003.

wormhole detection algorithm again, while other

[3] W. Du, L. Fang, and N. Peng. LAD: Localization

nodes receive such message will clean the hop-

anomaly detection for wireless sensor networks.

Journal of Parallel and Distributed Computing, 66(7):874–886, 2006. [4] T. C. M. Group.

[9] L. Lazos and R. Poovendran. SeRLoc: secure range-independent localization for wireless sen-

Wireless and Mo-

bility Extensions to ns-2.

obtain from

http://www.monarch.cs.cmu.edu/cmu-ns.html.

sor networks. Proceedings of the 2004 ACM workshop on Wireless security, pages 21–30, 2004. [10] D. Liu, P. Ning, and W. Du. Attack-resistant lo-

[5] L. Hu and D. Evans. Using Directional Antencation estimation in sensor networks. Informanas to Prevent Wormhole Attacks. Proceedings tion Processing in Sensor Networks, 2005. IPSN of the 11th Network and Distributed System Se2005. Fourth International Symposium on, pages curity Symposium, pages 131–141, 2004. 99–106, 2005. [6] Y. Hu, A. Perrig, and D. Johnson. Wormhole de[11] S. McCanne and S. Floyd. ns-2 Network Simutection in wireless ad hoc networks. Department lator. Obtain via: http://www. isi. edu/nsnam/ns. of Computer Science, Rice University, Tech. Rep. [12] J. Newsome, E. Shi, D. Song, and A. Perrig. The TR01-384, June, 2002. sybil attack in sensor networks: analysis & de[7] Y. Hu, A. Perrig, and D. Johnson.

Packet

fenses. Proceedings of the third international

Leashes: A Defense against Wormhole Attacks

symposium on Information processing in sensor

in Wireless Ad Hoc Networks. Proceedings of

networks, pages 259–268, 2004.

INFOCOM, 2003, 2003.

[13] P. Papadimitratos and Z. Haas. Secure routing

[8] J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagro-

for mobile ad hoc networks. SCS Communica-

dia, and B. Bhargava. Low-cost attacks against

tion Networks and Distributed Systems Model-

packet delivery, localization and time synchro-

ing and Simulation Conference (CNDS 2002),

nization services in under-water sensor net-

2002.

works. Proceedings of the 4th ACM workshop on Wireless security, pages 87–96, 2005.

[14] R. Poovendran and L. Lazos. A Graph Theoretic Framework for Preventing the Wormhole Attack

in Wireless Ad Hoc Networks. ACM Wireless Networks (WINET). [15] M. Vieira, C. Coelho Jr, D. da Silva Jr, and J. da Mata. Survey on wireless sensor network devices. IEEE Emerging Technologies and Factory Automation, pages 537–544, 2003. [16] W. Wang and B. Bhargava.

Visualization of

wormholes in sensor networks. Proceedings of the 2004 ACM workshop on Wireless security, pages 51–60, 2004. [17] A. Wood and J. Stankovic. Denial of service in sensor networks. Computer, 35(10):54–62, 2002. [18] Y. Xu, J. Ford, and F. S. Makedon. A Variation on Hop-counting for Geographic Routing. Embedded Networked Sensors, 2006. EmNetSIII. The third IEEE Workshop on, 2006. [19] J. Zheng and et.al. sion to NS-2.

802.15.4 exten-

Obtain via:

ee.ccny.cuny.edu/zheng/pub.

http://www-