Top Banner
1 Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi, M. Minier and JP. Babau Centre d'Innovations en Télécommunication & Intégration de services [email protected] PIMRC 2008
26

Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

Jun 28, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

1

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

W. Znaidi, M. Minier and JP. Babau

Centre d'Innovations en Télécommunication & Intégration de services

[email protected]

PIMRC 2008

Page 2: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

2

Outline

• Introduction and related work

• Our proposition

• Simulations and some results

• Conclusion

Page 3: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

3

a Wireless Sensors Network

• No infrastructure • Hundreds/Thousands of tiny devices• Difficult/impossible access to nodes • A typical application: the fire detection

• Sensor Devices :

– Have limited energy, memory and computation resources

– No tamper-resistant devices (physical compromising)

=+ +

Page 4: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

4

Attacks

Sinkhole attack Sybil attack

Routing cycle attack Hello flooding attack

Others attacks: Tampering, jamming, blackholes, wormhole, collision, desynchronisation, traffic analysis, eavesdropping, …

Page 5: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

5

What is a wormhole?

• Wormhole Attack: Two wireless devices

(X and Y) connected with an out-of-band

connection (by cable or high-power

Wireless radios).

– Y captures wireless transmissions in its

neighborhood, transfers them through Wormhole Link to X, and X re-injects all the packets there into the network (and vice versa).

• Characteristics: – Dangerous : all the traffic attracted to X-Y– Easy to mount and to launch– Hard to detect

Page 6: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

6

• Network effect:– Routing protocol may choose routes that contains the wormhole

link – Monitor traffic or drop packets, etc.

– distorts the network topology

Our goal: Detection and prevention of the wormhole attack in WSNs

What is a wormhole?

Page 7: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

7

Not specific to WSN: RFID

access control system:gate equipped with contactless smart card reader

contactless smart card

contactless smart cardemulator

smart cardreader emulator

fastconnection

wormhole

user may befar away from the building

Page 8: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

8

Overview of some detection algorithms of wormhole attack

Protocol Description Drawbacks

Hu and al. 2003 Use of packet leaches with geographical and temporal

information

requires synchronized clocks and GPS

equipped devices

L. Hu and al. 2004

Use the direction of the antennaOf the neighbors

use of directional antenna

R. Maheshwari and al. 2007

Search for forbidden structure caused by the wormhole

Difficulty to compute a parameter to determine

forbidden structure

Page 9: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

9

Our detection algorithm

• Main idea:– Every sensor node computes the connectivity degree of its

neighbors– Using this parameter, each node declares if it detected the

presence of the wormhole

• Assumption:

– Bidirectional link

– Static and dense network

Page 10: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

10

Background used

• Edge-clustering coefficient:

gji

gjig

ji s

zC

,

,, = i j

Ex. g=3

4

23, =jiC

k

gXji

Xgjig

Xji s

zC

\,

\,\, =

Ex. g=3

3

13\, =kjiCi j

• Modified edge-clustering coefficient:

Page 11: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

11

Def. of the wormhole using the edge-clustering coefficient

• Assumption: in a dense network such a WSN, we suppose that every couple of sensor nodes has at least one common 1-2 hop neighbor

• Let a and b two nodes in the WSN:

a declares b as a wormhole if

• Example:

0)( 4,3\,1 =∈∃ =gbXaCsuchbVX

00 4\,

3\, == XyaXya CandC

Node a declares X as a wormhole node

Page 12: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

12

Limitation and Solutions

• Generalization: X is away l-hop from node a a declares X as a wormhole if

• But: False positive:

• Solution: use the voting technique: every node declares a wormhole only if it received a sufficient number of alerts.

00 4\,

3\, == agjagj CandC

0)( 2\,1 =∈∃ +lXkaCsuchXVk

Page 13: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

13

Proposed algorithm

1. Neighborhood discovery: each node maintains the list of its 1-hop and 2-hop neighbors.

2. Computing: each node computes first , if it’s = 0 then it computes .

3. Isolation: if a node is declared as a wormhole, it uses the voting technique

Our algorithm is distributed, uses local neighborhood information and no extra hardware.

3.\.,.C

4.\..,C

Page 14: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

14

Simulations

• Scenario:– Single wormhole – 2 different topologies: random and grid distribution– 125 nodes over 400mx400m– Disk graph connectivity model– IEEE 802.11 MAC layer

• WSNet Simulator (developed in CITI Lab)

http://wsnet.gforge.inria.fr/

Page 15: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

15

Some results

Grid topology Random topology

Probability of wormhole detection, graph disconnection, false positive and false positive without boundary nodes

Page 16: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

16

Some results

Impact of the threshold on the false positive probabilityamT

Page 17: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

17

Conclusion

• Our algorithm is resilient to wormhole attack:– Without relying on any location inform (GPS)– Without introducing any special hardware – No packet added

• Our algorithm is simple, practical, local and provides a 100% detection of the wormhole detection.

• The mechanism used in our protocol such the edge-clustering coefficient, can be used for other proposals such auto-organization in WSNs

• Current work: Establishment pairwise key and access control using trivariate polynomial

Page 18: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

18

Questions ?

Thank you !

Page 19: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

19

WSN’s Key management using

trivariate Polynomials

Wassim Znaidi

Encadrants:

Marine Minier

19

Page 20: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

20

• Resource constraints: public keys not possible

• Symmetric method: keys shared between nodes.

• Assumptions:

– Static node, deployed anytime

– Trusted and powerful Sink

– All information are extract when a node is captured

Motivation

Page 21: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

21

Main Idea

• Blundo Model :

• Our trivariate polynomial :

• Characteristic: – t-secure

– Danger: If t nodes are compromised , all the system is broken

1ij

a1 re whe(Q) mod ),(

0,

−≤≤= ∑=

Qt

yxiayxf

ji

ji

j

1ijk

a1 where(Q) mod ),,(

0,,

−≤≤= ∑=

Qt

zyxiazyxf

kji

kji

jk

),(),( xyfyxfwith =

),,(),,( zxyfzyxfwith =

Page 22: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

22

Initialization phase (before nodesdeployment)

• The BS loads into each node i:

– : order of node i

– 2 authentication parameters:

),,(),( zyidfzyif i=

iz

)1

(i

a' wizN

h−

=

)0

(i

a w

N

h=

Page 23: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

23

Pair-wise key establishment

Page 24: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

24

Path-key establishment

• A pair-wise key established between non-neighboring nodes u and v

• Find a secure path of already established pair-wise keys

• Follow the pair-wise key establishment process, where all exchanged messages between u and v are authenticated throw the path

Page 25: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

25

Questions ?

Thank you !

Page 26: Detecting Wormhole Attacks in Wireless Networks Using ...€¦ · Overview of some detection algorithms of wormhole attack Protocol Description Drawbacks Hu and al. 2003 Use of packet

26

Pair-wise key establishment