DocumentCode :
7563
Title :
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
Author :
Shiyu Ji ; Tingting Chen ; Sheng Zhong
Author_Institution :
Oklahoma State Univ., Stillwater, OK, USA
Volume :
14
Issue :
3
fYear :
2015
fDate :
March 1 2015
Firstpage :
660
Lastpage :
674
Abstract :
Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes´ devastating harmful impact on network coding system performance through experiments. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. For the distributed wireless network, we propose DAWN, a Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks. We find that the robustness depends on the node density in the network, and prove a necessary condition to achieve collusion-resistance. DAWN does not rely on any location information, global synchronization assumptions or special hardware/middleware. It is only based on the local information that can be obtained from regular network coding protocols, and thus the overhead of our algorithms is tolerable. Extensive experimental results have verified the effectiveness and the efficiency of DAWN.
Keywords :
network coding; telecommunication network routing; telecommunication security; distributed detection algorithm; distributed wireless network; network coding protocols; node density; wireless network coding systems; wormhole attack detection algorithms; Encoding; Measurement; Network coding; Probability; Routing; Throughput; Wireless networks; Wireless networks; expected transmission count; random linear network coding; wormhole attack;
fLanguage :
English
Journal_Title :
Mobile Computing, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1233
Type :
jour
DOI :
10.1109/TMC.2014.2324572
Filename :
6815997
Link To Document :
بازگشت