LITE WORP

A lightweight countermeasure for the wormhole attack in multihop wireless networks

Issa Khalil, Saurabh Bagchi, Ness B. Shroff

Research output: Chapter in Book/Report/Conference proceedingConference contribution

194 Citations (Scopus)

Abstract

In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more than two hops away. In this paper, we present a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware. LITEWORP is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LITEWORP is applied is negligible compared to the loss encountered when the method is not applied.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Dependable Systems and Networks
Pages612-621
Number of pages10
DOIs
Publication statusPublished - 9 Nov 2005
Externally publishedYes
Event2005 International Conference on Dependable Systems and Networks - Yokohama, Japan
Duration: 28 Jun 20051 Jul 2005

Other

Other2005 International Conference on Dependable Systems and Networks
CountryJapan
CityYokohama
Period28/6/051/7/05

Fingerprint

Sensor networks
Wireless networks
Ad hoc networks
Tunnels
Computer systems
Hardware

Keywords

  • Compromised node detection
  • Compromised node isolation
  • Neighbor watch
  • Wireless sensor and ad-hoc networks
  • Wormhole attack

ASJC Scopus subject areas

  • Computer Science (miscellaneous)
  • Computer Networks and Communications

Cite this

Khalil, I., Bagchi, S., & Shroff, N. B. (2005). LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In Proceedings of the International Conference on Dependable Systems and Networks (pp. 612-621) https://doi.org/10.1109/DSN.2005.58

LITE WORP : A lightweight countermeasure for the wormhole attack in multihop wireless networks. / Khalil, Issa; Bagchi, Saurabh; Shroff, Ness B.

Proceedings of the International Conference on Dependable Systems and Networks. 2005. p. 612-621.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Khalil, I, Bagchi, S & Shroff, NB 2005, LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks. in Proceedings of the International Conference on Dependable Systems and Networks. pp. 612-621, 2005 International Conference on Dependable Systems and Networks, Yokohama, Japan, 28/6/05. https://doi.org/10.1109/DSN.2005.58
Khalil I, Bagchi S, Shroff NB. LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In Proceedings of the International Conference on Dependable Systems and Networks. 2005. p. 612-621 https://doi.org/10.1109/DSN.2005.58
Khalil, Issa ; Bagchi, Saurabh ; Shroff, Ness B. / LITE WORP : A lightweight countermeasure for the wormhole attack in multihop wireless networks. Proceedings of the International Conference on Dependable Systems and Networks. 2005. pp. 612-621
@inproceedings{c601d8f8f24343b2aeced8f714845b76,
title = "LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks",
abstract = "In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more than two hops away. In this paper, we present a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware. LITEWORP is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LITEWORP is applied is negligible compared to the loss encountered when the method is not applied.",
keywords = "Compromised node detection, Compromised node isolation, Neighbor watch, Wireless sensor and ad-hoc networks, Wormhole attack",
author = "Issa Khalil and Saurabh Bagchi and Shroff, {Ness B.}",
year = "2005",
month = "11",
day = "9",
doi = "10.1109/DSN.2005.58",
language = "English",
pages = "612--621",
booktitle = "Proceedings of the International Conference on Dependable Systems and Networks",

}

TY - GEN

T1 - LITE WORP

T2 - A lightweight countermeasure for the wormhole attack in multihop wireless networks

AU - Khalil, Issa

AU - Bagchi, Saurabh

AU - Shroff, Ness B.

PY - 2005/11/9

Y1 - 2005/11/9

N2 - In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more than two hops away. In this paper, we present a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware. LITEWORP is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LITEWORP is applied is negligible compared to the loss encountered when the method is not applied.

AB - In multihop wireless systems, such as ad-hoc and sensor networks, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is known as the wormhole attack, where a malicious node records control and data traffic at one location and tunnels it to a colluding node, which replays it locally. This can have an adverse effect in route establishment by preventing nodes from discovering routes that are more than two hops away. In this paper, we present a lightweight countermeasure for the wormhole attack, called LITEWORP, which does not require specialized hardware. LITEWORP is particularly suitable for resource-constrained multihop wireless networks, such as sensor networks. Our solution allows detection of the wormhole, followed by isolation of the malicious nodes. Simulation results show that every wormhole is detected and isolated within a very short period of time over a large range of scenarios. The results also show that the fraction of packets lost due to the wormhole when LITEWORP is applied is negligible compared to the loss encountered when the method is not applied.

KW - Compromised node detection

KW - Compromised node isolation

KW - Neighbor watch

KW - Wireless sensor and ad-hoc networks

KW - Wormhole attack

UR - http://www.scopus.com/inward/record.url?scp=27544468419&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=27544468419&partnerID=8YFLogxK

U2 - 10.1109/DSN.2005.58

DO - 10.1109/DSN.2005.58

M3 - Conference contribution

SP - 612

EP - 621

BT - Proceedings of the International Conference on Dependable Systems and Networks

ER -