A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks

作者: Radha Poovendran , Loukas Lazos

DOI: 10.1007/S11276-006-3723-X

关键词:

摘要: Wireless ad hoc networks are envisioned to be randomly deployed in versatile and potentially hostile environments. Hence, providing secure uninterrupted communication between the un-tethered network nodes becomes a critical problem. In this paper, we investigate wormhole attack wireless networks, an that can disrupt vital functions such as routing. attack, adversary establishes low-latency unidirectional or bi-directional link, wired long-range two points not within range of each other. The attacker then records one more messages at end tunnels them via link other end, replays into timely manner. is easily implemented particularly challenging detect, since it does require breach authenticity confidentiality communication, compromise any host. We present graph theoretic framework for modeling links derive necessary sufficient conditions detecting defending against attacks. Based on our framework, show candidate solution preventing wormholes should construct subgraph geometric defined by radio nodes. Making use propose cryptographic mechanism based local broadcast keys order prevent wormholes. Our need time synchronization measurement, requires only small fraction know their location, decentralized. suitable with most stringent constraints sensor networks. Finally, believe work first provide analytical evaluation terms probabilities extent which method prevents

参考文章(53)
Douglas Stinson, Cryptography: Theory and Practice,Second Edition CRC/C&H. ,(2002)
Mathew Penrose, Random Geometric Graphs ,(2003)
Adrian Perrig, JD Tygar, Adrian Perrig, JD Tygar, None, TESLA Broadcast Authentication Springer, Boston, MA. pp. 29- 53 ,(2003) , 10.1007/978-1-4615-0229-6_3
Ronald L. Rivest, The RC5 encryption algorithm fast software encryption. pp. 86- 96 ,(1994) , 10.1007/3-540-60590-8_7
Robert Gallager, Dimitri Bertsekas, Data networks (2nd ed.) Prentice-Hall, Inc.. ,(1992)
Brian J. Matt, David W. Carman, Peter S. Kruus, CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY ,(2000)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Stefan Brands, David Chaum, Distance-bounding protocols theory and application of cryptographic techniques. pp. 344- 359 ,(1994) , 10.1007/3-540-48285-7_30
Lingxuan Hu, David Evans, Using Directional Antennas to Prevent Wormhole Attacks. network and distributed system security symposium. ,(2004)
Bernhard Hofmann-Wellenhof, Herbert Lichtenegger, James Collins, Global Positioning System: Theory and Practice ,(1992)