LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks

Issa Khalil, Saurabh Bagchi, Ness B. Shroff

    Research output: Contribution to journalArticlepeer-review

    60 Citations (Scopus)

    Abstract

    In multihop wireless systems, such as ad hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This can either disrupt route establishment or make routes pass through the malicious nodes. In this paper, we present a lightweight countermeasure for the wormhole attack, called LiteWorp, which relies on overhearing neighbor communication. LiteWorp is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LiteWorp is applied is negligible compared to the loss in an unprotected network. Simulation results bring out the configuration where no framing is possible, while still having high detection rate. Analysis is done to show the low resource consumption of LiteWorp, the low detection latency, and the likelihood of framing by malicious nodes.

    Original languageEnglish
    Pages (from-to)3750-3772
    Number of pages23
    JournalComputer Networks
    Volume51
    Issue number13
    DOIs
    Publication statusPublished - Sep 12 2007

    Keywords

    • Malicious node detection
    • Malicious node isolation
    • Neighbor watch
    • Wireless sensor and ad hoc networks
    • Wormhole attack

    ASJC Scopus subject areas

    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks'. Together they form a unique fingerprint.

    Cite this