LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks

Issa Khalil, Saurabh Bagchi*, Ness B. Shroff

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

67 Citations (Scopus)

Abstract

In multihop wireless systems, such as ad hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node far away, which replays it locally. This can either disrupt route establishment or make routes pass through the malicious nodes. In this paper, we present a lightweight countermeasure for the wormhole attack, called LiteWorp, which relies on overhearing neighbor communication. LiteWorp is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LiteWorp is applied is negligible compared to the loss in an unprotected network. Simulation results bring out the configuration where no framing is possible, while still having high detection rate. Analysis is done to show the low resource consumption of LiteWorp, the low detection latency, and the likelihood of framing by malicious nodes.

Original languageEnglish
Pages (from-to)3750-3772
Number of pages23
JournalComputer Networks
Volume51
Issue number13
DOIs
Publication statusPublished - 12 Sept 2007
Externally publishedYes

Keywords

  • Malicious node detection
  • Malicious node isolation
  • Neighbor watch
  • Wireless sensor and ad hoc networks
  • Wormhole attack

Fingerprint

Dive into the research topics of 'LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks'. Together they form a unique fingerprint.

Cite this