| Literature DB >> 22247657 |
Jonny Karlsson1, Laurence S Dooley, Göran Pulkkis.
Abstract
As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes are able to disrupt a major component of network traffic, while concomitantly being extremely difficult to detect. This paper introduces a new wormhole detection paradigm based upon Traversal Time and Hop Count Analysis (TTHCA), which in comparison to existing algorithms, consistently affords superior detection performance, allied with low false positive rates for all wormhole variants. Simulation results confirm that the TTHCA model exhibits robust wormhole route detection in various network scenarios, while incurring only a small network overhead. This feature makes TTHCA an attractive choice for MANET environments which generally comprise devices, such as wireless sensors, which possess a limited processing capability.Entities:
Keywords: DelPHI; MANET; MANET security; MHA; WAP; hop count; mobile networks; routing security; traversal time; wormhole attack
Mesh:
Year: 2011 PMID: 22247657 PMCID: PMC3251974 DOI: 10.3390/s111211122
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.MANET example where MHA fails to detect a PM O-B wormhole.
Figure 2.The TTHCA extended AODV route discovery algorithm.
Simulation parameter settings.
| Number of nodes | 300 |
| Network area ( | 4,000,000 m2 |
| Network width ( | Random: 1,500 m–4,000 m |
| Network length ( | |
| Node wireless hardware | IEEE 802.11b |
| Maximum radio range / node ( | 250 m |
| Packet propagation speed ( | 300,000,000 m/s |
| Routing packet processing delay/node ( | 22 ms, 3 ms, 4 ms |
| Number of samples per test case: | |
| Wormhole infected routes ( | 100 |
| Total number of routes ( | |
| Output: | |
| Wormhole detection rate (%) | Number of identified wormhole routes / |
| FP occurrence rate (%) | Falsely identified wormhole routes / |
Figure 3.Sample environment from the NS-2 simulator showing a 4-hop PM O-B wormhole link, with the source and destination nodes in red.
Figure 4.HM O-B wormhole (WH) detection and FP occurrence performance.
Figure 5.HM I-B wormhole (WH) detection and FP occurrence performance.
Figure 6.PM I-B wormhole (WH) detection and FP occurrence performance.
Figure 7.PM O-B wormhole (WH) detection and FP occurrence performance.
Statistical significance test results for wormhole detection and FP performance.
| Wormhole variants | Result type | TTHCA | TTHCA | |
|---|---|---|---|---|
| Type | Length (hops) | |||
| HM I-B | 3–6 | Wormhole | ||
| FP | ||||
| PM O-B | 3 | Wormhole | ||
| FP | ||||
| 4–6 | Wormhole | |||
| FP | ||||
Figure 8.TTHCA time measurement error tolerance per node for a PM O-B wormhole (WH).
Figure 9.Radio coverage variation tolerances for TTHCA in detecting a PM O-B wormhole (WH).
Route discovery delay analysis for MHA and TTHCA compared with AODV.
| MHA | 92% | 98% |
| TTHCA | 0% | 43% |
Chi-square test results for wormhole detection rate differences for TTHCA vs. MHA and TTHCA vs. DelPHI.
| Wormhole variants | TTHCA | TTHCA | |
|---|---|---|---|
| Type | Length (hops) | ||
| HM I-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| HM O-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| PM I-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| PM O-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
Chi-square test results for FP occurrence rate differences for TTHCA vs. MHA and TTHCA vs. DelPHI.
| Wormhole variants | TTHCA | TTHCA | |
|---|---|---|---|
| Type | Length (hops) | ||
| HM I-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| HM O-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| PM I-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||
| PM O-B | 3 | ||
| 4 | |||
| 5 | |||
| 6 | |||