ABSTRACT
Several protocols have been proposed to defend against wormholes in ad hoc networks by adopting positioning devices, synchronized clocks, or directional antennas. In this paper, we propose a mechanism, MDS-VOW, to detect wormholes in a sensor network. MDS-VOW first reconstructs the layout of the sensors using multi-dimensional scaling. To compensate the distortions caused by distance measurement errors, a surface smoothing scheme is adopted. MDS-VOW then detects the wormhole by visualizing the anomalies introduced by the attack. The anomalies, which are caused by the fake connections through the wormhole, bend the reconstructed surface to pull the sensors that are faraway to each other. Through detecting the bending feature, the wormhole is located and the fake connections are identified. The contributions of MDS-VOW are: (1) it does not require the sensors to be equipped with special hardware, (2) it adopts and combines the techniques from social science, computer graphics, and scientific visualization to attack the problem in network security. We examine the accuracy of the proposed mechanism when the sensors are deployed in a circle area and one wormhole exists in the network. The results show that MDS-VOW has a low false alarm ratio when the distance measurement errors are not large.
- P. Bahl and V. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, in the Proceedings of INFOCOM, 2000.Google Scholar
- P. Biswas and Y. Ye, Semidefinite Programming for Ad Hoc Wireless Sensor Network Localization, in the Proceedings of Information Processing in Sensor Networks (IPSN), 2004. Google ScholarDigital Library
- C. Boyd and A. Mathuria, Key Establishment Protocols for Secure Mobile Communications: A Selective Survey, Lecture Notes in Computer Science, 1998. Google ScholarDigital Library
- S. Capkun, L. Buttyan, and J. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, in the Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. Google ScholarDigital Library
- R. Choudhury, X. Yang, R. Ramanathan, and N. Vaidya, Using Directional Antennas for Medium Access Control in Ad Hoc Networks, in the Proceedings of ACM MobiCom, 2002. Google ScholarDigital Library
- B. Dahill, B. Levine, E. Royer, and C. Shields, A Secure Routing Protocol for Ad hoc Networks, Tech Report 02-32, Dept. of Computer Science, University of Massachusetts, Amherst, 2001. Google ScholarDigital Library
- M. Davison, Multidimensional Scaling, John Wiley and Sons, 1983.Google Scholar
- M. Duarte and Y. Hu, Vehicle Classification in Distributed Sensor Networks, to be published in Journal of Parallel and Distributed Computing, 2004. Google ScholarDigital Library
- O. Garcia-Panyella, An easy-to-code smoothing algorithm for 3D reconstructed surfaces, Graphics programming methods, 139--146, Charles River Media, Inc, 2003. Google ScholarDigital Library
- G. Golub and C. V. Loan, Matrix Computations, Johns Hopkins University Press, 1996.Google Scholar
- H. Hoppe, T. DeRose, T. Duchamp, J. McDonald, and W. Stuetzle Surface reconstruction from unorganized points, in Proceedings of ACM SIGGRAPH, 71--78, 1992. Google ScholarDigital Library
- L. Hu and D. Evans, Using Directional Antennas to Prevent Wormhole Attacks, in the Proceedings of Network and Distributed System Security Symposium (NDSS), 2004.Google Scholar
- Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in the Proceedings of INFOCOM, 2003.Google Scholar
- Y. Hu, A. Perrig, and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003. Google ScholarDigital Library
- X. Ji and H. Zha, Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling, in the Proceedings of IEEE INFOCOM, 2004.Google Scholar
- Y. Ko, V. Shankarkumar, and N. Vaidya, Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, in the Proceedings of INFOCOM, 13--21, 2000.Google Scholar
- A. Ladd, K. Bekris, A. Rudys, G. Marceau, L. Kavraki, and D. Wallach, Robotics-Based Location Sensing using Wireless Ethernet, in the Proceedings of ACM MobiCom, 2002. Google ScholarDigital Library
- T. Mitsa and K. J. Parker, Digital Halftoning Using a Blue-Noise Mask, in the Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, 1991.Google Scholar
- D. Niculescu and B. Nath, Ad hoc positioning system (APS) using AoA, in the Proceedings of INFOCOM, 2003.Google Scholar
- P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, in the Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.Google Scholar
- N. Priyantha, A. Chakraborty, and H. Padmanabhan, The cricket location support system, in the Proceeding of ACM MobiCom, 32--43, 2000. Google ScholarDigital Library
- N. Sastry, U. Shanker, and D. Wagner, Secure Verification of Location Claims, in the Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003. Google ScholarDigital Library
- C. Savarese, K. Langendoen, and J. Rabaey, Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of USENIX Technical Annual Conference, 317--328, 2001. Google ScholarDigital Library
- C. Savarese, J. Rabaey, and J. Beutel, Locationing in Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of ICASSP, 2001.Google Scholar
- A. Savvides, C. Han, and M. Srivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, in the Proceedings of ACM MobiCom, 2001. Google ScholarDigital Library
- Y. Shang, W. Ruml, Y. Zhang, and M. Fromherz, Localization from mere connectivity, in the Proceedings of the 4th ACM international symposium on mobile ad hoc networking and computing, 2003. Google ScholarDigital Library
- W. Torgeson, Multidimensional scaling of similarity, Psychometrika, (30)379--393, 1965.Google Scholar
- A. Ward, A. Jones, and A. Hopper, A New Location Technique for the Active Office, in IEEE Personnel Communications, 4(5):42--47, 1997.Google Scholar
Index Terms
- Visualization of wormholes in sensor networks
Recommendations
Proactive mitigation of impact of wormholes and sinkholes on routing security in energy-efficient wireless sensor networks
Sensor networks are deployed in a variety of environments for unattended operation. In a hostile terrain, sensor nodes are vulnerable to node capture and cryptographic material compromise. Compromised nodes can be used for launching wormhole and ...
Towards clock skew based services in wireless sensor networks
Clock skew, an inherent property of clock crystals of physical devices, is defined as the rate of deviation of a device clock from the true time. The frequency of a device's clock actually depends on its environment, such as the temperature, humidity, ...
Compromise-resilient anti-jamming communication in wireless sensor networks
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works ...
Comments