skip to main content
10.1145/1023646.1023657acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Visualization of wormholes in sensor networks

Published:01 October 2004Publication History

ABSTRACT

Several protocols have been proposed to defend against wormholes in ad hoc networks by adopting positioning devices, synchronized clocks, or directional antennas. In this paper, we propose a mechanism, MDS-VOW, to detect wormholes in a sensor network. MDS-VOW first reconstructs the layout of the sensors using multi-dimensional scaling. To compensate the distortions caused by distance measurement errors, a surface smoothing scheme is adopted. MDS-VOW then detects the wormhole by visualizing the anomalies introduced by the attack. The anomalies, which are caused by the fake connections through the wormhole, bend the reconstructed surface to pull the sensors that are faraway to each other. Through detecting the bending feature, the wormhole is located and the fake connections are identified. The contributions of MDS-VOW are: (1) it does not require the sensors to be equipped with special hardware, (2) it adopts and combines the techniques from social science, computer graphics, and scientific visualization to attack the problem in network security. We examine the accuracy of the proposed mechanism when the sensors are deployed in a circle area and one wormhole exists in the network. The results show that MDS-VOW has a low false alarm ratio when the distance measurement errors are not large.

References

  1. P. Bahl and V. Padmanabhan, RADAR: An In-Building RF-Based User Location and Tracking System, in the Proceedings of INFOCOM, 2000.Google ScholarGoogle Scholar
  2. P. Biswas and Y. Ye, Semidefinite Programming for Ad Hoc Wireless Sensor Network Localization, in the Proceedings of Information Processing in Sensor Networks (IPSN), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Boyd and A. Mathuria, Key Establishment Protocols for Secure Mobile Communications: A Selective Survey, Lecture Notes in Computer Science, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Capkun, L. Buttyan, and J. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, in the Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. R. Choudhury, X. Yang, R. Ramanathan, and N. Vaidya, Using Directional Antennas for Medium Access Control in Ad Hoc Networks, in the Proceedings of ACM MobiCom, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Dahill, B. Levine, E. Royer, and C. Shields, A Secure Routing Protocol for Ad hoc Networks, Tech Report 02-32, Dept. of Computer Science, University of Massachusetts, Amherst, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Davison, Multidimensional Scaling, John Wiley and Sons, 1983.Google ScholarGoogle Scholar
  8. M. Duarte and Y. Hu, Vehicle Classification in Distributed Sensor Networks, to be published in Journal of Parallel and Distributed Computing, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. O. Garcia-Panyella, An easy-to-code smoothing algorithm for 3D reconstructed surfaces, Graphics programming methods, 139--146, Charles River Media, Inc, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. G. Golub and C. V. Loan, Matrix Computations, Johns Hopkins University Press, 1996.Google ScholarGoogle Scholar
  11. H. Hoppe, T. DeRose, T. Duchamp, J. McDonald, and W. Stuetzle Surface reconstruction from unorganized points, in Proceedings of ACM SIGGRAPH, 71--78, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Hu and D. Evans, Using Directional Antennas to Prevent Wormhole Attacks, in the Proceedings of Network and Distributed System Security Symposium (NDSS), 2004.Google ScholarGoogle Scholar
  13. Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks, in the Proceedings of INFOCOM, 2003.Google ScholarGoogle Scholar
  14. Y. Hu, A. Perrig, and D. Johnson, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. X. Ji and H. Zha, Sensor Positioning in Wireless Ad-hoc Sensor Networks with Multidimensional Scaling, in the Proceedings of IEEE INFOCOM, 2004.Google ScholarGoogle Scholar
  16. Y. Ko, V. Shankarkumar, and N. Vaidya, Medium Access Control Protocols using Directional Antennas in Ad Hoc Networks, in the Proceedings of INFOCOM, 13--21, 2000.Google ScholarGoogle Scholar
  17. A. Ladd, K. Bekris, A. Rudys, G. Marceau, L. Kavraki, and D. Wallach, Robotics-Based Location Sensing using Wireless Ethernet, in the Proceedings of ACM MobiCom, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Mitsa and K. J. Parker, Digital Halftoning Using a Blue-Noise Mask, in the Proceedings of the International Conference on Acoustics, Speech, and Signal Processing, 1991.Google ScholarGoogle Scholar
  19. D. Niculescu and B. Nath, Ad hoc positioning system (APS) using AoA, in the Proceedings of INFOCOM, 2003.Google ScholarGoogle Scholar
  20. P. Papadimitratos and Z. Haas, Secure Routing for Mobile Ad Hoc Networks, in the Proceedings of SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), 2002.Google ScholarGoogle Scholar
  21. N. Priyantha, A. Chakraborty, and H. Padmanabhan, The cricket location support system, in the Proceeding of ACM MobiCom, 32--43, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. N. Sastry, U. Shanker, and D. Wagner, Secure Verification of Location Claims, in the Proceedings of the ACM Workshop on Wireless Security (WiSe), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Savarese, K. Langendoen, and J. Rabaey, Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of USENIX Technical Annual Conference, 317--328, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. C. Savarese, J. Rabaey, and J. Beutel, Locationing in Distributed Ad-Hoc Wireless Sensor Networks, in the Proceedings of ICASSP, 2001.Google ScholarGoogle Scholar
  25. A. Savvides, C. Han, and M. Srivastava, Dynamic fine-grained localization in ad-hoc networks of sensors, in the Proceedings of ACM MobiCom, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. Shang, W. Ruml, Y. Zhang, and M. Fromherz, Localization from mere connectivity, in the Proceedings of the 4th ACM international symposium on mobile ad hoc networking and computing, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. W. Torgeson, Multidimensional scaling of similarity, Psychometrika, (30)379--393, 1965.Google ScholarGoogle Scholar
  28. A. Ward, A. Jones, and A. Hopper, A New Location Technique for the Active Office, in IEEE Personnel Communications, 4(5):42--47, 1997.Google ScholarGoogle Scholar

Index Terms

  1. Visualization of wormholes in sensor networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WiSe '04: Proceedings of the 3rd ACM workshop on Wireless security
      October 2004
      104 pages
      ISBN:158113925X
      DOI:10.1145/1023646

      Copyright © 2004 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 October 2004

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate10of41submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader