detecting wormhole attacks in wireless networks using ...€¦ · overview of some detection...

Post on 28-Jun-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

W. Znaidi, M. Minier and JP. Babau

Centre d'Innovations en Télécommunication & Intégration de services

wassim.znaidi@insa-lyon.fr

PIMRC 2008

2

Outline

• Introduction and related work

• Our proposition

• Simulations and some results

• Conclusion

3

a Wireless Sensors Network

• No infrastructure • Hundreds/Thousands of tiny devices• Difficult/impossible access to nodes • A typical application: the fire detection

• Sensor Devices :

– Have limited energy, memory and computation resources

– No tamper-resistant devices (physical compromising)

=+ +

4

Attacks

Sinkhole attack Sybil attack

Routing cycle attack Hello flooding attack

Others attacks: Tampering, jamming, blackholes, wormhole, collision, desynchronisation, traffic analysis, eavesdropping, …

5

What is a wormhole?

• Wormhole Attack: Two wireless devices

(X and Y) connected with an out-of-band

connection (by cable or high-power

Wireless radios).

– Y captures wireless transmissions in its

neighborhood, transfers them through Wormhole Link to X, and X re-injects all the packets there into the network (and vice versa).

• Characteristics: – Dangerous : all the traffic attracted to X-Y– Easy to mount and to launch– Hard to detect

6

• Network effect:– Routing protocol may choose routes that contains the wormhole

link – Monitor traffic or drop packets, etc.

– distorts the network topology

Our goal: Detection and prevention of the wormhole attack in WSNs

What is a wormhole?

7

Not specific to WSN: RFID

access control system:gate equipped with contactless smart card reader

contactless smart card

contactless smart cardemulator

smart cardreader emulator

fastconnection

wormhole

user may befar away from the building

8

Overview of some detection algorithms of wormhole attack

Protocol Description Drawbacks

Hu and al. 2003 Use of packet leaches with geographical and temporal

information

requires synchronized clocks and GPS

equipped devices

L. Hu and al. 2004

Use the direction of the antennaOf the neighbors

use of directional antenna

R. Maheshwari and al. 2007

Search for forbidden structure caused by the wormhole

Difficulty to compute a parameter to determine

forbidden structure

9

Our detection algorithm

• Main idea:– Every sensor node computes the connectivity degree of its

neighbors– Using this parameter, each node declares if it detected the

presence of the wormhole

• Assumption:

– Bidirectional link

– Static and dense network

10

Background used

• Edge-clustering coefficient:

gji

gjig

ji s

zC

,

,, = i j

Ex. g=3

4

23, =jiC

k

gXji

Xgjig

Xji s

zC

\,

\,\, =

Ex. g=3

3

13\, =kjiCi j

• Modified edge-clustering coefficient:

11

Def. of the wormhole using the edge-clustering coefficient

• Assumption: in a dense network such a WSN, we suppose that every couple of sensor nodes has at least one common 1-2 hop neighbor

• Let a and b two nodes in the WSN:

a declares b as a wormhole if

• Example:

0)( 4,3\,1 =∈∃ =gbXaCsuchbVX

00 4\,

3\, == XyaXya CandC

Node a declares X as a wormhole node

12

Limitation and Solutions

• Generalization: X is away l-hop from node a a declares X as a wormhole if

• But: False positive:

• Solution: use the voting technique: every node declares a wormhole only if it received a sufficient number of alerts.

00 4\,

3\, == agjagj CandC

0)( 2\,1 =∈∃ +lXkaCsuchXVk

13

Proposed algorithm

1. Neighborhood discovery: each node maintains the list of its 1-hop and 2-hop neighbors.

2. Computing: each node computes first , if it’s = 0 then it computes .

3. Isolation: if a node is declared as a wormhole, it uses the voting technique

Our algorithm is distributed, uses local neighborhood information and no extra hardware.

3.\.,.C

4.\..,C

14

Simulations

• Scenario:– Single wormhole – 2 different topologies: random and grid distribution– 125 nodes over 400mx400m– Disk graph connectivity model– IEEE 802.11 MAC layer

• WSNet Simulator (developed in CITI Lab)

http://wsnet.gforge.inria.fr/

15

Some results

Grid topology Random topology

Probability of wormhole detection, graph disconnection, false positive and false positive without boundary nodes

16

Some results

Impact of the threshold on the false positive probabilityamT

17

Conclusion

• Our algorithm is resilient to wormhole attack:– Without relying on any location inform (GPS)– Without introducing any special hardware – No packet added

• Our algorithm is simple, practical, local and provides a 100% detection of the wormhole detection.

• The mechanism used in our protocol such the edge-clustering coefficient, can be used for other proposals such auto-organization in WSNs

• Current work: Establishment pairwise key and access control using trivariate polynomial

18

Questions ?

Thank you !

19

WSN’s Key management using

trivariate Polynomials

Wassim Znaidi

Encadrants:

Marine Minier

19

20

• Resource constraints: public keys not possible

• Symmetric method: keys shared between nodes.

• Assumptions:

– Static node, deployed anytime

– Trusted and powerful Sink

– All information are extract when a node is captured

Motivation

21

Main Idea

• Blundo Model :

• Our trivariate polynomial :

• Characteristic: – t-secure

– Danger: If t nodes are compromised , all the system is broken

1ij

a1 re whe(Q) mod ),(

0,

−≤≤= ∑=

Qt

yxiayxf

ji

ji

j

1ijk

a1 where(Q) mod ),,(

0,,

−≤≤= ∑=

Qt

zyxiazyxf

kji

kji

jk

),(),( xyfyxfwith =

),,(),,( zxyfzyxfwith =

22

Initialization phase (before nodesdeployment)

• The BS loads into each node i:

– : order of node i

– 2 authentication parameters:

),,(),( zyidfzyif i=

iz

)1

(i

a' wizN

h−

=

)0

(i

a w

N

h=

23

Pair-wise key establishment

24

Path-key establishment

• A pair-wise key established between non-neighboring nodes u and v

• Find a secure path of already established pair-wise keys

• Follow the pair-wise key establishment process, where all exchanged messages between u and v are authenticated throw the path

25

Questions ?

Thank you !

26

Pair-wise key establishment

top related