Multirate DelPHI to secure multirate ad hoc networks against wormhole attacks

被引:13
|
作者
Qazi, Shams [1 ]
Raad, Raad [2 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[2] Univ Wollongong, Sch Elect Comp & Telecommun Engn, Wollongong, NSW 2522, Australia
关键词
Ad hoc networks; Wormhole attacks; DelPHI; AODV Round trip time (RTT);
D O I
10.1016/j.jisa.2018.01.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
DelPHI [1] is a highly cited protocol that secures Ad hoc On Demand Distance Vector (AODV) routing protocol against wormhole attacks. DelPHI assumes that the underlying wireless transmission rate is constant. Under such an assumption it has a wormhole detection rate above 80%. In this work we show that DelPHI is unable to secure AODV in a multirate transmission environment because it does not take into account the variable bit rate nature of the wireless channel and assumes a constant bit rate leading to either false detection or no detection of wormhole attacks. We go on to propose an extension to DelPHI (M-DelPHI) that adapts it to the multirate 802.11 wireless channel. We propose three fundamental extensions: 1. Multirate channel, 2. Processing delay and 3. Neighbour monitoring. We provide 2 test cases that demonstrate our extension and simulate the new protocol in different environments. We show that M-DelPHI performs exceptionally well resulting in above 90% wormhole detection rate against inbound and out-of-band wormholes under the specified test conditions. Crown Copyright (C) 2018 Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [1] Securing DSR against wormhole attacks in multirate ad hoc networks
    Qazi, Shams
    Raad, Raad
    Mu, Yi
    Susilo, Willy
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 582 - 592
  • [2] End-to-end protocol to secure ad hoc networks against wormhole attacks
    Khurana, Sandhya
    Gupta, Neelima
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 994 - 1002
  • [3] Defending against wormhole attacks in mobile ad hoc networks
    Wang, Weichao
    Bhargava, Bharat
    Lu, Yi
    Wu, Xiaoxin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2006, 6 (04): : 483 - 503
  • [4] Available Bandwidth in Multirate and Multihop Wireless Ad Hoc Networks
    Chen, Feng
    Zhai, Hongqiang
    Fang, Yuguang
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2010, 28 (03) : 299 - 307
  • [5] A secure and resistant architecture against attacks for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 150 - 166
  • [6] DelPHI: Wormhole detection mechanism for ad hoc wireless networks
    Chiu, Hon Sun
    Lui, King-Shan
    [J]. INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, 2006, : 149 - +
  • [7] An Opportunistic Multiradio MAC Protocol in Multirate Wireless Ad Hoc Networks
    Chen, Feng
    Zhai, Hongqiang
    Fang, Yuguang
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (05) : 2642 - 2651
  • [8] WORMEROS: A New Framework for Defending against Wormhole Attacks on Wireless Ad Hoc Networks
    Vu, Hai
    Kulkarni, Ajay
    Sarac, Kamil
    Mittal, Neeraj
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, PROCEEDINGS, 2008, 5258 : 491 - 502
  • [9] Detecting and avoiding wormhole attacks in wireless ad hoc networks
    Nait-Abdesselam, Farid
    Bensaou, Brahim
    Taleb, Tarik
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2008, 46 (04) : 127 - 133
  • [10] Secure cooperative mobile ad hoc networks against injecting traffic attacks
    Yu, W
    Liu, KJR
    [J]. 2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 55 - 64