You are on page 1of 8

2009 Third International Conference on Network and System Security

DeWorm: A Simple Protocol to Detect Wormhole


Attacks in Wireless Ad hoc Networks
Thaier Hayajneh Prashant Krishnamurthy David Tipper
University of Pittsburgh University of Pittsburgh University of Pittsburgh
Pittsburgh, PA, USA Pittsburgh, PA, USA Pittsburgh, PA, USA
Email: hayajneh@sis.pitt.edu Email: prashant@sis.pitt.edu Email: dtipper@sis.pitt.edu

Abstract—The wormhole attack is considered to be a serious which may not provide the required location accuracy, espe-
security attack in multihop ad hoc and sensor networks. We cially in indoor and urban areas. Defense mechanisms that rely
propose “DeWorm”, a simple protocol to effectively detect on time measurement and synchronized clocks cannot always
wormhole attacks without the need for special hardware and/or
strict location or synchronization requirements. DeWorm makes detect physical layer wormholes. Protocols that use special
use of discrepancies in routing information between neighbors hardware such as directional antennas [4], special RF [5], or
to detect wormholes. A simulation based analysis of DeWorm ultrasound [6] add expense, complexity, and need for special
for a variety of scenarios shows that the proposed protocol can customization. Previous work that relied on node connectivity
detect wormhole attacks with a high detection rate, a low false (or node degree) information [7]–[9] (and did not use location
positive rate and low overhead. Further, in comparison to other
wormhole detection protocols, the proposed protocol is simple, or time information) fail to detect many types of wormholes.
localized, and capable of detecting a variety of types of wormhole For example, a wormhole that connects only one node with
attacks including physical layer wormholes. another node located several hops away will only increase the
node degree by one, connectively anomalies are not observed,
I. I NTRODUCTION and such a wormhole will not be detected. However, it can
Mobile ad hoc and sensor networks are comprised of nodes still cause the same damage to the network.
that must cooperate to dynamically establish routes using For a wormhole attack to have a successful impact on
wireless links. Routes may involve multiple hops with each the network it must attract a significant amount of network
node acting as a router. Since ad hoc and sensor networks traffic by providing a perceived short-cut through the net-
typically work in an open untrusted environment with little work. Hence, routes going through the wormhole must be
physical security, they are subject to a number of unique shorter than alternate routes through valid network nodes.
security attacks. One attack in ad hoc and sensor networks that This observation is the basis of our wormhole detection
has received a great deal of recent attention is the wormhole protocol “DeWorm”. Specifically, in DeWorm, we use routing
attack [1]–[3]. In a wormhole attack, an adversary will capture discrepancies between neighboring nodes along a path from
packets at one point in the network and tunnel them to a a source to a destination to detect wormhole attacks. The
distant location where they are replayed, typically without protocol is simple and localized, can be applied on demand
modification. This results in extraneous links controlled by an (when the existence or lack thereof of a wormhole needs
adversary. For example an attacker can construct a physical to be verified), needs no special hardware, localization, or
layer wormhole attack by placing two transceivers M1 and synchronization and can detect physical layer wormholes. We
M2 in the network as shown in Fig.1. The transceivers M 1 present simulation based results evaluating DeWorm in grid-
and M2 , though physically apart, are connected through a like and randomly distributed networks with various connec-
high speed wired or long range high speed wireless link tivity models (unit disk graph - UDG, Quasi-UDG, both with
called the wormhole link. Legitimate network nodes consider symmetric and asymmetric links). Our numerical results show
the wormhole link as a short path from one side of the that DeWorm has a high wormhole detection rate and few false
network to the other side. For example, nodes B, 6, 7, 14 , positives. The cost of the protocol is the addition of a little
and 23 in Fig.1 will assume that nodes C, 8, 9, and 10 are overhead and that only when executed in on-demand fashion
one-hop neighbors due to the wormhole. Consequently, the for wormhole detection.
wormhole will attract a large amount of traffic between various The rest of the paper is organized as follows. Section 2
source and destination nodes in the network. Once traffic describes related work on wormholes. The DeWorm protocol
is routed through the wormhole, the attacker can selectively is explained in Section 3. A discussion of other issues and
drop data packets or cause intermittent disconnections that limitations of DeWorm are presented in Section 4. Section 5
will lead to denial-of-service. Cryptographic techniques (e.g., presents overhead analysis and simulation results and Section
encryption/authentication) do not detect the wormhole attack 6 concludes the paper.
as the transceivers simply relay the encrypted or authenticated
packets. II. R ELATED W ORK
Most of the previously proposed techniques to detect worm- In the physical layer wormhole [10], the wormhole captures
hole attacks require precise and accurate information about the bits or the waveforms from one side, transmits them
the location of nodes, the time of packet transmission and on the other side using high speed links, and replays the
synchronization between nodes, or the use of special hardware exact bits or the received waveforms using physical layer
(e.g., directional antennas). Protocols that depend on location repeaters. Transmission and replay can start before the receipt
information require the nodes to be equipped with GPS [1], of the entire packet. In [11] wormhole attacks were classified

978-0-7695-3838-9/09 $26.00 © 2009 IEEE 73


DOI 10.1109/NSS.2009.85

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
connectivity statistics before the attack (when the system is
normal) are compared with the corresponding values after the
2
5
6 23 8
10 attack. This assumes that the wormhole does not exist at the
D
B M1 M2
time they gather the statistics and that the statistics do not
S A E
1
7 14
15 16 Optical fiber 18
19 9
C change due to other causes (e.g., mobility, node failure).
3 17

11
4
13 22
20 21 The node degree is used to detect wormholes in [8]. The
12
assumption here is that the wormhole will increase the number
of one-hop neighbors of a node. If this number is greater
Fig. 1. Wormhole detection example than some threshold then the node will need to check for a
wormhole. If however the wormhole connects a single node
with another node that is far away, the node degree only
according to whether nodes M1 and M2 in Fig.1 are visible changes by one and the wormhole will not be detected. But
on the route (or simply replay packets). In [12], physical layer the damage to the network is comparable to a wormhole
wormhole attacks were classified based on the type of links connecting a group of nodes. Also, the original node degree
used by M1 and M2 , namely: (1) existing wireless data paths needs to be known and the wormhole removal process may
(i.e., in-band), or (2) high speed out-of-band channels. completely isolate some nodes from the network. In [9] a
Hu et al. [1], [13], who introduced wormhole attacks in ad similar approach to [8] was presented. Again the assumption
hoc networks, suggested the use of geographical or temporal made is that the wormhole will significantly increase the
packet leashes to detect wormholes. A geographical leash number of one-hop neighbors and that the nodes are uniformly
requires each node to know its own location and all nodes and densely deployed. The nodes are assumed to be fixed and
to have loosely time synchronized clocks. The nodes need static with no links changed or added.
to securely exchange location information. A sender node The work closest in scope to ours is the one employing
can then ensure that the receiver is within a certain distance connectivity information [7] to detect wormholes. The protocol
and detect discrepancies therein. With temporal leashes, all does not rely on location or tight synchronization, but needs
nodes must have tightly synchronized clocks. The receiver centralized topology information. The protocol looks for for-
will compare the receiving time with the sending time attached bidden substructures in the connectivity graph that should not
with the packet. It can determine if the packet has traveled too be present in a legal connectivity graph. However, detection
far in too little time and detect the wormhole attack. Temporal is not guaranteed without the availability of a specific number
packet leashes may not detect physical layer wormholes. of independent neighbors, or a high node degree. We compare
Capkun et al. [5] presented a protocol that does not re- our results with the results presented in [7] in Section V.E.
quire synchronization or location information but depends on
special hardware for a challenge request-response sequence III. T HE D E W ORM P ROTOCOL
and requires accurate time measurements. Directional antennas We start by describing the network and the attack model
have been used in [4] to prevent wormhole attacks. They used. Consider an arbitrary ad hoc or sensor network con-
assumed that the antennas on all nodes are aligned (which sisting of n nodes represented by the ordered set N . Let W
may be difficult in practice). Khalil et al. have developed two denote the set of source-destination pairs (W ⊂ N × N ); note
protocols to defend against wormholes: LITEWORP [14] and that at the most, there are n×(n−1) elements in W . For each
MOBIWORP [15]. LITEWORP works with a static network (i, j) ∈ W , we let Pi,j denote the set of nodes on the path
and assumes that there is a guard node within the transmission from i to j selected by the network routing algorithm. Let the
range of any two neighboring nodes. The guard will monitor length of the path from node i to j be lij hops. We represent
m 1
all traffic and detect selective forwarding by the wormhole the m-th node on the path as Pi,j . Thus Pi,j will be the first
lij −1
attack. Thus LITEWORP requires overhead in terms of guard hop from node i and Pi,j will be the last hop to node j. Let
nodes and a dense network for successful operation. MOBI- the set of one-hop neighbors of a node i be Bi . The wormhole
WORP works with mobile networks but requires location in- equipment M1 ↔ M2 is defined as two extra nodes M1 and
formation, a trusted central authority, and assumes the network M2 that are not part of the network, i.e., not elements of N .
to be loosely time synchronized. In [10] a timing based defense Here we assume a closed wormhole where M1 and M2 are
mechanism against wormhole attacks is presented. Existing not visible to their neighbors (i.e., they do not advertise their
MAC layer acknowledgments are used to detect a wormhole. node IDs or MAC addresses) and that the wormhole is an out-
However, the protocol cannot detect physical layer wormholes. of-band physical layer wormhole that uses a high speed link to
A centralized protocol to detect wormholes in sensor net- connect M1 and M2 . Detecting such wormholes is considered
works was presented in [16]. Here, the network is recon- to be extremely difficult [14]. The set of one-hop neighbors of
structed using multi-dimensional scaling and the wormhole M1 and M2 will be BM1 and BM2 , respectively. Note that by
is detected by visualizing the anomalies introduced by the definition, every node in BM1 is connected to all the nodes in
attack. Poovendran and Lazos [17] present a graph theoretic BM2 via the wormhole and vice versa. Thus Bi , the one-hop
framework for modeling wormhole links and derive the nec- neighbor set of node i could include nodes within transmission
essary and sufficient conditions to detect and defend against range and those on the other side of the wormhole.
wormhole attacks. The authors also propose a cryptographic
mechanism based on local broadcast keys to prevent wormhole A. DeWorm detection process
attacks. None of these protocols can detect all types of The basic idea of the DeWorm protocol is to find alternative
wormhole attacks, as discussed in [13]. routes to a target node that do not pass through the wormhole.
Qian et al. [18] present a scheme to detect wormhole attacks These alternative routes will be significantly different in length
based on statistical analysis. Here the values of routing and compared to the route that passes through the wormhole –

74

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
otherwise the wormhole will not attract large amounts of the hello message and will reply to S.
traffic. Consider a communicating source-destination node pair Step(3): S will create a list of the nodes in BS and marks node
1 1
(S, D) ∈ W , with route PS,D . If node S wishes to detect the PS,D . Note that node PS,D ∈ PS,D and is known during route
existence of a wormhole, a naive approach would be to delete discovery to the destination D.
the nodes in the current route PS,D from consideration. Next, Step(4): S will broadcast the list (BS , T ) and ask every node
S would discover a new route to D and if the length of the new q ∈ {BS − PS,D } to find a route to target node T , such that
route differs significantly compared to the length of PS,D (i.e., the route does not include any other node in BS (we call this
greater than a threshold), it concludes a wormhole exists. This the forbidden list). That is, ∀q, z ∈ BS where q = z, DeWorm
approach unfortunately will not work because it is difficult to ensures that z ∈/ Pq,T . Each node q ∈ {BS − PS,D } will run
ensure that the alternate route does not traverse through the the network routing algorithm and reply to S with lqT , the
wormhole as well (in which case the two routes will have length (in number of hops, or the cost) of its route to T . If lqT
similar lengths). Ensuring that the wormhole is avoided is not does not exist due to the connectivity of the network topology
trivial because S will have no idea as to the location of the then q will inform S and S discards q from {BS − PS,D }.
wormhole along the route PS,D . Furthermore, as illustrated in Step(5): The sender will pick a “selected route” and determine
Fig.1 the wormhole will typically connect several nodes (i.e., its length. For example, L = M ax {lqT } ∀q ∈ {BS − PS,D },
BM1 and BM2 ) and it is likely that the alternate end-to-end the length of the longest route can be used (other options for
route between S and D will also pass through the wormhole. In L are discussed in Section IV-A). The sender tests for the
order to avoid this problem DeWorm works through the nodes existence of a wormhole by comparing the length L of the
in PS,D in a sliding fashion checking the length of alternate “selected route” to T with the direct route. Specifically, if
routes between nodes that are a short distance apart (2 hops L − 2 > η then the sender will assume that a wormhole is
typically) and employs a forbidden list to avoid neighbor nodes detected. Note, that L − 2 is used because T is 2 hops away
possibly in range of the wormhole (i.e., BM2 ). from S and η is a tunable sensitivity parameter (see Section
IV-A). If a wormhole is detected then DeWorm stops.
Step
Start from Sender Step(6): If no wormhole is detected, then one increments the
1
procedure to the next hop along the route (e.g., node PS,D
0 who has route to Ask all neighbors
Destination except marked one to
4
3
will become the new “sender” S and PS,D
find route to "Target"
Set "Target" to avoiding one-hop becomes the new
neighbors in route and
1
second hop along
the route report number of hops target T ).
Step(7): If the new sender is not the last node on the route
lSD −1
2
Send "Hello" to all
neighbors
# Hops of selected
Yes Wormhole before the destination D (i.e., S = PS,D ), then steps
5 -2 > Sensitivity
Parameter
Detected
numbered 1 to 6 will be repeated by the new “sender”.
Pick one-hop No
Comment: DeWorm will detect the wormhole when a node
neighbors not on
existing route; Make next hop
that is within M1 ’s range becomes the “sender”. In this
case node u ∈ BM1 will perform steps 1 to 6. InStep 2,
3 6
Mark one-hop sender
neighbor on route
u determines its neighbor list Bu = Bˆu ∪ BM2 which
includes not only the true one-hop neighbors Bˆu that are
7 Is sender last
node before
destination?

No
within node u’s range but also all the nodes that are within
M2 ’s range. Node u will ask all nodes q ∈ {Bu − PS,D } to
Yes
Yes

8
find routes to the target node T = x that appears to be two
Get neighbors and
one-hop neighbors # Hops of selected No No
hops away – it is actually one-hop from v – such that the
routes exclude nodes in Bu . When a node q ∈ Bˆu , i.e., a true
of destination 11 -2 > Sensitivity
Wormhole
Parameter

one-hop neighbor, tries to find a route to node T = x, it also


Set "Target" to a 10
Ask neighbors to find
indirect route to
avoids routes containing the nodes in BM2 . Thus the reported
9 one-hop neighbor
of destination
“Target” avoiding other
neighbors and report
lqT ≥ (2 + length of wormhole). If the wormhole spans a
number of hops length greater than η and L = M ax {lqT } ∀q ∈ {BS − PS,D }
then certainly L − 2 > η and the wormhole is detected.
Fig. 2. Flow chart for the protocol
Example: Following the example in Fig.1 the sender node S
A flow chart of the DeWorm protocol is shown in Fig.2. We wants to communicate with node D using the shortest path (S-
discuss the steps in the flowchart below. Consider a source A-B-C-E-D). Note that there are five hops to the destination.
node S that wants to communicate with destination node D Obviously this route passes through the wormhole and nodes
and wishes to test for a wormhole. Let u, v, x ∈ PS,D – they B and C are connected through the wormhole nodes M1 and
are nodes on the path from S to D that was obtained by using M2 without being aware of this fact.
some standard routing protocol. Let the wormhole M1 ↔ M2 Step(1): Node S will set the target node T = B.
connect nodes u and v where u ∈ BM1 and v ∈ BM2 . Let x Step(2): Node S will broadcast a “hello” message.
be the next hop from v on the route from S to D. Note that Step(3): Node S will receive replies from nodes A, 1, 2, and
u and v are typically separated by several hops, but now will 3 and will add them to its one-hop neighbors’ list.
believe that they are neighbors. Step(4): Node S will broadcast its neighbors’ list and ask
Step(1) The “Sender” node S will set the target node T to nodes 1, 2, and 3 to find a route to the target node B, which
2
be the node two hops away along the path, i.e., T = PS,D does not go through any node from the neighbors’ list. Nodes
initially. 1, 2, and 3 are required to find a route to B that does not
Step(2): S will discover all its one-hop neighbors BS by go through nodes S, A, 1, 2 and 3. In our example, nodes 1,
broadcasting a “hello” message. The nodes in BS will hear 2, and 3 will find routes to B as: (1-11-12-4-B), (2-5-B), and

75

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
(3-4-B) and they will inform the sender S that the lengths of hop neighbors BˆD and the nodes that are within M1 ’s range.
the routes to B are 4, 2, and 2 hops, respectively. The sender Node u will ask all nodes q ∈ Bu (except D) to find indirect
will pick the longest route as the “selected route” with 4 hops routes to the target node T ∈ {BD } that will avoid nodes in
here, and compares it with 2 hops. {BD ∪ Bu }. Note that both BM1 and BM2 are ⊂ {BD ∪ Bu }.
Step(5): In this example the length of the selected route minus Depending on the location of T we will have two cases and
2 will be 4 - 2 = 2 which is not greater than the sensitivity in both, node u will detect the wormhole. In the first case
parameter. Thus, no wormhole is detected. node u may pick node T ∈ BˆD but ∈ / BM1 . The one-hop
Step(6): The next hop – node A – will become the new neighbors of u that are in Bˆu will have long indirect routes
“sender” (there is now a new target as well – node C). to T while those in BM2 will not. In the second case node
Step(7): Steps numbered 1 to 6 will be repeated by the new u may pick node T ∈ BM1 but ∈ / BˆD . Then, the one-hop
sender until either a wormhole is detected or the destination neighbors of u that are in BM2 will have long indirect routes
node is reached. to T . Consequently, in both cases there will be a long route
In our example, node A will pick nodes 3 and 4. The routes from a neighbor to T and the wormhole will be successfully
from nodes 3 and 4 to C (excluding nodes S, 3, 4, and B) will detected.
be (3-12-13-7-C) and (4, 13, 7, C), respectively. The selected Example: In the example in Fig. 1, let us suppose that the
route minus 2 will be 4 -2 = 2, which is again not greater than destination is node C and that node A was not able to detect
2. Thus the wormhole is still not detected and the new sender the wormhole. We need the last node on the route, right before
will be the next hop, node B. the destination node, node B, to detect the wormhole. Node
Node B will have nodes A, 4, 6, 7, 8, 9, 10, and C in its B will have nodes A, 4, 6, 7, 8, 9, 10, and C in its one-hop
one-hop neighbors list. Note that the replies from nodes C, 8, neighbors list. Node B will ask node C to provide its one-
9, and 10 are transmitted by M1 . Nodes 4, 6, 7, 8, 9, and 10 hop neighbors’ list, which will contain nodes 9, 21, E, B, 6,
will all try to find routes to node E that do not pass through 7, 14, and 23. Node B could pick any of node’s C one-hop
the one-hop neighbors’ list of node B. Since all the nodes that neighbors as the target node. Next, node B will ask its one-
are within the range of M2 (nodes C, 8, 9, and 10) cannot be hop neighbors (except node C) to find an indirect path to the
in the route to the target node, any route from nodes 4, 6, or 7 target node excluding the one-hop neighbors of both nodes B
will not pass through the wormhole and will be long enough and C. This forbidden list will have nodes A, 4, 6, 7, 8, 9, 10,
to detect the wormhole. The selected route will be from node C, 21, E, B, 14, and 23 (this list includes nodes that are within
4 that is (4, 13, 22, 14, 15, 16, 17, 18, 19, 20, 21, E) which M1 and M2 range). In the first case node B may pick a target
has 11 hops. Thus in this case we have 11 - 2 = 9 which is node that is on M2 side of the network (node 9, 21 or E). In
greater than 2 and consequently node B will inform node S this case the one-hop neighbors of node B that are located on
that a wormhole has been detected. M1 side (nodes 4, 6, 7) will have long indirect routes to the
Special Case: Steps 8-12 in the lower part of the DeWorm target node. In the second case node B may pick a target node
flowchart Fig.2 are activated only if a wormhole is not detected that is on M1 ’s side of the network ( node 6, 7,14 or 23). In
and the “sender” becomes the last node before the destination this case the perceived one-hop neighbors of node B that are
lSD −1
S = PS,D . This will occur when PS,D does not pass located on M2 ’s side (nodes 8, 9, 10) will have long indirect
through a wormhole or if the destination node D is next to routes to the target node. Thus in both cases there will be a
the wormhole (i.e., D ∈ BM2 ). In either event the DeWorm long route and the wormhole will be successfully detected.
protocol follows the procedure below.
lSD −1
Step(8): Node S = PS,D will discover all its one-hop IV. A NALYSIS OF D E W ORM
neighbors BS by broadcasting a “hello” message and will ask A. Route Selected for Comparison and Sensitivity Parameter
node D to provide its one-hop neighbor’s list BD .
Step(9): Node S will set as the “Target” a node that is D’s DeWorm, essentially has two parameters to be selected, the
neighbor. That is T ∈ BD . sensitivity parameter η and the method for determining L from
Step(10): Node S will broadcast the list (BS ∪BD , T ) and ask the set of routes found to the target node (i.e., the “selected
every node q ∈ BS (except D) to find an indirect path to T route” mentioned previously). Wormholes are at least longer
(has to pass through at least one other node before reaching T ), than the transmission range of a node (otherwise their impact is
which does not include any other node in {BS ∪ BD }. That minimal). With η = 1, even short wormholes can be detected.
is ∀q, z ∈ BS where q = z DeWorm ensures that z ∈ / Pq,T However, the number of false positives will increase. Using
and lqT > 1. Each node q ∈ BS will run the network routing η = 5 reduces false positives but short wormholes may escape
algorithm and reply to S with lqT . detection. The simulation results in Section V.C show that η =
Step(11): The sender will pick a “selected route” and de- 2 or 3 will give the best tradeoff between the detection rate
termine its length. For example, L = M ax {lqT } ∀q ∈ and false positives.
{BS − PS,D }. Again, if L−2 > η then the sender will assume There are many possibilities for determining L from the set
that a wormhole is detected. of routes found to the target node T for comparison with η to
detect the wormhole. In our simulations we have tested several
Comment: If there is wormhole connecting node u =
lSD −1 route selection methods to determine L (see section V.C). In
PS,D  node u ∈ BM1 will have a neighbor
 node D then
with
the previous section, we used the length of the longest route
ˆ
list Bu = Bu ∪ BM which includes not only the true one- as the value of L to illustrate DeWorm. Another option is to
2
use the average length of the computed routes to the target
hop neighbors Bˆu within node u’s range but also all the nodes
as L. The former increases the false positives while the latter
within M2 ’s range. Similarly,
  D ∈ BM2 will have its
node
reduces the detection rate (see Table I). Ultimately, we used
ˆ
neighbor list BD = BD ∪ BM1 with both the true one- a method that provides the best detection and a reasonable

76

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
number of false positives. The sender creates a list from Mobility will not impact the performance of DeWorm, except
the replies containing route lengths to the target node from if the topology changes rapidly resulting in new neighbors
its neighbors and sorts them according to their lengths from arriving around M2 . However, the check for the existence
longest to shortest (excluding replies from neighbors that do of a wormhole is expected to be reasonably fast and can be
not have routes to the target node). The sender picks L as the completed before mobility can change routes from the nodes to
length of a route that is smaller than the longest route by not the target node by a large value. Neighbors need to find routes
more than η if it exists. Otherwise L is picked as the length to the target node, which is on average 2 to 3 hops away. In
of the longest route. We find that the shortest such route – [21] it was shown that route acquisition latency depends on
e.g., if the longest route has 10 hops, the sensitivity parameter the length of the route. Thus the average delay in this case
is 2, a route with 8 hops if it exists – is the best option. But can be expected to be small.
a route with 9 hops is better than the route with 10 hops if We did not discuss using DeWorm with any specific routing
one with 8 hops is not in the list. The reason why we do not protocol. A comprehensive survey of routing protocols for ad
pick the longest route when such shorter routes are available hoc networks is presented in [22]. Some proactive routing
is to avoid cases when the longest routes are actually outliers. protocols may provide useful and ready information that can
By eliminating the longest of the long routes, we reduce the be used by DeWorm. For example, the information needed
number of false positives. Using η to decide whether the length in steps 1 to 4 of DeWorm, described in Section III-A, may
of a shorter route is sufficient, ensures that we do not miss already be available in the routing table. If this information is
those cases where the longest route is the only long available fresh, then the nodes can use it to find the shortest route to
route from a node located at M1 ’s side that can be used to the target node that avoids the blacklisted neighborhood nodes.
detect the wormhole. This method is labeled “Sensitivity” in This will reduce the overhead and delay with DeWorm. Other
Table I. routing protocols may need some modifications to work with
DeWorm (e.g., those designed to provide nodes only with the
B. Low Node Degree Modification next hop that will deliver their packets to the destination and
DeWorm does not need a network with a high node degree not the entire route).
as in [7] to detect wormholes (see Section V.C) although It is possible that the transceivers M1 and M2 are so
its effectiveness improves with the node degree. To maintain advanced that they can selectively relay control messages
very high detection rates in sparse networks with extremely to change the neighbor list each time. We suggest a minor
low node degree, we suggest the following modification. The modification so that this cannot thwart DeWorm. If the control
sender will inform his neighbors of not only the target node, messages are encrypted, M1 and M2 will not know the identity
but also with the complete route to the destination. If a of nodes sending them. Also, the sender node can try to find
neighbor cannot find a route to the target node, then it will try his one-hop neighbors again immediately after he receives
to find a route to the next hop that comes after the target node the route information from his one-hop neighbors. If the list
along the route to the destination and so on. It will try all the is changed, then the sender will broadcast the new list also
nodes on the route to the destination including the destination. to incorporate this information during execution of DeWorm.
When the neighbor finds a route it informs the sender about This attack is beyond the known wormhole attack [11], [12]
the length of its route and it will also specify the target node of addressed in the literature.
this route. This will also help to resolve the situation when the
wormhole is connecting two separate (partitioned) networks. V. P ERFORMANCE E VALUATION
In this situation none of the neighboring nodes will succeed
to find any route to the target node or to any of the nodes A. Overhead Analysis
along the route to the destination. If this is the case then S can Here we discuss the overhead resulting from the use of the
confidently assume that there is a wormhole that is connecting DeWorm protocol. We employ a model with given network
two separate networks. specifications (such as: network size, number of nodes, and
nodes’ transmission range) to determine the following: (i)
C. Limitations The average number of packets that need to be broadcast by
If a critical node (if this node is removed, the network will the sender nodes (these contain information about the target
be partitioned) exists in the route from S to D then DeWorm node and the forbidden list of nodes). (ii) The number of
will work only if M1 ↔ M2 is closer to S than the critical route acquisitions performed by neighbor nodes to the target
node by at least one hop. Otherwise, the neighbors of a node node, which also equals the total number of replies (contains
that is one hop from the critical node along the route will information on the length of the route to the target node).
not be able to find any route to the target node that avoids We start with the number of nodes that need to become
the critical node. If critical nodes are few and don’t change “senders” to check for the wormhole until it is detected. This
in the network, one possible solution to this issue is to use a equals the number of broadcast messages and this number
protocol that can identify critical nodes [19], [20] a priori that depends on the number of hops between the sender and the
will cooperate with DeWorm. A critical node and the node destination and the position of the wormhole. Let us suppose
just before it along the route will then be exempt from using that nodes are uniformly and randomly distributed in a square
DeWorm. area of size A2 . Nodes can communicate directly if the
distance between them is less than the transmission range R.
D. Other Issues Let di,j be the distance between two nodes i and j. Let Ni,j
Results in section V.C will show that DeWorm is not be the number of hops of the shortest path between nodes i
sensitive to the connectivity model (i.e., with quasi-UDG and and j. Then we have, as shown in [23], the minimum number
asymmetric links). DeWorm was not tested for mobile systems. of nodes between the sender S and the destination D as:

77

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
NS,D ≥ dS,D /R and, NS,D = βdS,D /R, where 1 ≤ β ≤ 2. the transmission range R of nodes with omni-directional
A proof is shown in [23]. antennas is modeled as a disk of unit radius. Links between
Let M1 and M2 be the transceivers of the wormhole located nodes exist only if they fall within the disk. The UDG model
somewhere between S and D. The wormhole will be detected does not consider the vagaries of radio propagation [25]. So,
when the latest “sender” along the route is located within M1 ’s the Quasi-UDG model [25] is suggested where a link between
range. In the best case M1 could be a neighbor of S and two nodes will exist if the distance between them is less than
thus detected immediately. In the worst case M1 could be two αR and α is the quasi-UDG factor (where, 0 ≤ α ≤ 1).
hops away from D (M2 is D’s neighbor – we assume that the A link will not exist if the distance is greater than R. For
special case in Section III-A is identical to other cases but it the case, αR ≤ distance ≤ R, the link will exist with
requires a few extra messages). Thus, on average, the number probability (R − distance)/(R − αR). We used α = 0.75
of “senders” that need to check for the wormhole will be: in our simulations.
In our simulations we considered 144 nodes, placed in a
NCheck = (βdS,D /R − 2)/2 = (βdS,D /2R) − 1 1200m × 1200m square area. Two different node distributions
2 were considered, namely: (1) random and (2) grid. For the
With a square area√ of size A , the longest distance between random node case, the coordinates of the nodes (xi , yi ) for
S and D can be 2A. This happens when the sender and
destination are located at two opposite corners diagonally. The i = 1, 2, ...144 were independently and randomly chosen
maximum number of sender nodes that need to check for the in the range from 100 to 1200m using a uniform [100-
wormhole before the wormhole is detected NCheck is: 1200] random number generator. In the grid case, nodes
√ are located in a perturbed 12 × 12 grid. The coordinates of
NCheck = ( 2βA/2R) − 1 (1) each node xi and yj were randomly chosen using uniform
random variables in the ranges (100i − p100, 100i + p100)
The probability of having k number of neighbors within the and (100j − p100, 100j + p100), respectively, where p is
transmission range R of a node can be derived as in [24]: the perturbation parameter and i = 1, ...12 and j = 1, ...12
  (in our simulation we choose p = 0.2). After the nodes are
N
P (k) = (πR2 /A2 )k (1 − πR2 /A2 )N −k distributed, the connectivity model (UDG, quasi-UDG) and
k
the transmission range determine the network topology. To
where N is the total number of nodes in the network. Thus change the average node degree, the transmission range of
the average number of neighbors will be: the nodes was varied from 120m to 160m. After the nodes
 are arranged in the network according to the distributions and
AVk = k · P (k) = N · π · R2 /A2 connectivity models, the sender node is randomly chosen from
the left-most nodes in the network (nodes with x < 200) and
The expected number of replies AVRep that each sender the destination node is randomly chosen from the right-most
will receive will be equal to average number of neighbors nodes (nodes with x > 1000). The wormhole is randomly
excluding the previous and the next hop along the route to created somewhere between the sender and the receiver with a
the destination node. The total number of replies and also the random length that is uniformly distributed between the nodes’
total number of route acquisitions to the target node will be: maximum transmission range to little less than the distance
√ between the source and the destination.
NCheck ·AVRep = (( 2βA/2R)−1)·(π·N ·(R/A)2 −2) (2)
For each combination of connectivity and distribution mod-
For a given A, R, and N , the number of packets that need els and η values the simulation is repeated with different
to be broadcast by sender nodes is given by (1). We show node distributions, sender-destination pairs, and wormhole
that this is not a significant overhead in section V.D. Later lengths and locations. The detection % is the number of times
in section V.D we will use the number of route acquisitions DeWorm successfully detected the the wormhole out of the
given by (2) with the parameters of the simulated network and total number of times the simulation was run (1000 times).
β = 1 and β = 1.5, to define a lower and upper bound for the We also measured the % of false positives, which occurs when
number of route acquisitions. This will be compared with the a node in the route to the destination mistakenly detects a
actual number from simulations and shown to be reasonably wormhole when no wormhole actually exists. The simulations
accurate. were programmed in C using DSR routing protocol and node
distribution models from ns-2.
B. Simulations
The important metrics for wormhole detection are: the per- C. Results
centage of correct detection of the wormhole and the percent- 1) Method for Selecting the Route for Comparison :
age of false positives. We evaluated these metrics for DeWorm In Section IV-A we discussed various possible methods for
for various node distribution and connectivity models. We selecting the alternate route whose length L is used by
used distributions and connectivity models similar to those DeWorm to detect the wormhole. Table I shows the % of
used in [7]. We considered two connectivity models: the unit wormhole detection and false positives for various selection
disk graph and the quasi-unit disk graph. Two different node methds: comparing the current route with the average length
distribution models were used: grid distribution with some of all routes, the longest route, and using the sensitivity
perturbations and random distribution. Finally, we studied the parameter to eliminate the longest routes, but compare with
performance of DeWorm in the case of asymmetric links, again the next longest as described in Section IV-A. We show the
with different connectivity and node distribution models. results for both grid like and randomly distributed networks
Connectivity and distribution models: In the unit disk graph and with UDG connectivity. We only show the results for a
model (UDG) [25], widely used for studying ad-hoc networks, sensitivity parameter of 3. The results show that using the

78

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
100 20 FalsepositivesͲUDGͲ Grid 100
FalsepositivesͲ QUDGͲ Grid
95 FalsepositivesͲUDGͲ Random 80 DetectionͲGrid
15
FalsepositivesͲ QUDGͲ Random FalsepositivesͲGrid
90 60 DetectionͲRandom
DetectionͲUDGͲ Grid 10
Percentage

Percentage
FalsepositivesͲRandom

Percentage
85 40
DetectionͲ QUDGͲ Grid
DetectionͲUDGͲ Random 5 20
80
DetectionͲ QUDGͲ Random
75 0 0
1 2 3 4 5 1 2 3 4 5 2 4 6
SensitivityParameter SensitivityParameter Av.nodeDegree
(a) (b) (c)
100 40 FalsepositivesͲUDGͲ Grid 30 Simulation
FalsepositivesͲQUDGͲ Grid

no.ofrouteacquisition
95 FalsepositivesͲUDGͲ Random B=1
30 FalsepositivesͲQUDGͲ Random 25 B=1.5
90
85 20 20
DetectionͲUDGͲGrid
Percentage

Percentage
80 DetectionͲQUDGͲ Grid
10 15
75 DetectionͲUDGͲ Random
DetectionͲQUDGͲ Random 10
70 0
1 2 3 4 5 1 2 3 4 5 120 130 140 150 160
SensitivityParameter SensitivityParameter TransmissionRange
(d) (e) (f)

Fig. 3. (a) % Detection with symmetric links (b) % False positive with symmetric links (c) Impact of node degree (d) % Detection with asymmetric links
(e) % False positive with asymmetric links (f) Route acquisitions

sensitivity parameter as described in Section IV-A provides reason, in subsequent results, we use a fixed node degree of
the best detection percentage and a reasonable number of false 5 and 6). The results show that DeWorm will still work for
positives. Thus in all our simulations we used this method for a low average node degree and achieves excellent detection
selecting the route for comparison. rates. However, the percentage of false positives is high for
node degrees less than 4. The underlying reason for this is
Grid Random that fewer links are available between the nodes, and thus,
Detection False positives Detection False positives the routes from the neighboring nodes may take physically
Average 98.5 0.1 98.2 0.31
Sensitivity 99.63 0.4 99.65 1.42 circuitous paths and result in much longer routes (in terms of
Longest 100 1.65 99.7655 8.9 hops) to the target node. In Fig. 3c, we only show the detection
TABLE I
probabilities for average node degrees higher than 4 for the
C OMPARISON OF ROUTE SELECTION METHOD random node distribution. The reason is that for node degrees
less than 4, the network will not have enough connectivity and
2) Impact of Node Distribution: Figs. 3a and 3b show the sometimes the neighboring nodes will not have routes to the
wormhole detection and false positive rates with DeWorm for target node. The protocol in [7], in some scenarios, requires a
a grid distributed network with p = 0.2 with various values of node degree greater than 7 to achieve a 100% detection rate
sensitivity parameter and for UDG and Quasi-UDG. In both with random node distribution.
cases, the detection is almost 100% for sensitivity parameter 4) Asymmetric links: Here, we use an asymmetric link
values of 2 and 3. False positives decrease with η. model similar to the one in [26]. The transmission range of a
Figs. 3a and 3b also show the wormhole detection and false node is determined by the power level of the node. Nodes are
positive rates for randomly distributed networks with UDG classified into high power nodes with maximum transmission
and Quasi-UDG connectivity. Like the grid distribution, with range, and low power nodes with minimum transmission range
a sensitivity parameter of 3, the wormhole detection is almost (equal to half the maximum range). In our simulations, 50% of
100%. However, in the random distribution case, the effect the nodes randomly have half the transmission range. However,
of the sensitivity parameter is more significant (higher false we had to increase the transmission range by a small margin
positives in general). This is due to the randomization in the to maintain connectivity in this case. In the literature there
node distribution. Thus the routes from the neighboring nodes is no clear definition of the node degree for networks with
may be longer than the route from the next hop node, with asymmetric links, so we show only the detection and false
the difference being greater than a small sensitivity parameter. positive rate. Figs. 3d and 3e show the % of wormhole
This will result in more false positives. detection and false positives with UDG and Quasi-UDG and
3) Average Node Degree: Our protocol does not require asymmetric links for grid-like and randomly distributed nodes.
a large node degree for good performance. Fig. 3c shows Like the symmetric case, with sensitivity parameters of 2 and
the detection percentage and percentage of false positives for 3, the wormhole detection is almost 100%, with a slightly
various node degrees with grid and random node distributions, higher number of false positives compared to the symmetric
respectively. In the simulations, the average node degree was case. Thus DeWorm is capable of accurate wormhole detection
changed by changing the transmission range of the nodes and in the presence of asymmetric links.
by changing the network size. The larger the transmission 5) Wormhole length: We tested DeWorm with different
range and the smaller the network size the higher is the node wormhole lengths. We ran 1000 simulations with Q-UDG,
degree. Increasing the node degree by more than 5 makes no symmetric links, R = 150m, η = 2, and for both grid and
difference in the detection/false positive percentages (for this random topologies. The results in Table II show that DeWorm

79

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.
Wormhole length 1.5R 2.0R 2.5R 3.0R 3.5R 4.0R ACKNOWLEDGMENT
detection-Grid 94.0 99.48 100 100 100 100
detection-Random 80.3 89.22 93.1 98.55 99.56 100 This research was supported in part by the Army Research
Office MURI grant W911NF-07-1-0318. The authors thank
TABLE II
I MPACT OF WORMHOLE LENGTH anonymous reviewers for their comments to improve the paper.

R EFERENCES
can detect short wormholes (1.5R) nearly 95% of the time for [1] Y. C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense
grid and 80% of the time for random topologies. against wormhole attacks in wireless networks,” in Proc. of IEEE
INFOCOM, 2003.
[2] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc
D. Overhead networks,” in Proc. of CNDS, 2002.
[3] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-
Fig. 3f shows the total number of route acquisitions with Royer, “A secure routing protocol for ad hoc networks,” in Proc. of
different R. We used (2) with A = 1200m, N = 144, and IEEE ICNP, 2002.
R was varied from 125m to 155m. We chose β = 1 and [4] L. Hu and D. Evans, “Using directional antennas to prevent wormhole
attacks,” in Proc. of NDSS, 2004.
β = 1.5 to obtain the lower and upper bounds for the total [5] S. Capkun, L. Buttya’n, and J.-P. Hubaux, “Sector: secure tracking of
number of route acquisitions, respectively. In the simulations, node encounters in multi-hop wireless networks,” in Proc. of the 1st
we considered the grid-like distributed nodes case with the ACM workshop on Security of ad hoc and sensor networks, 2003.
[6] N. Sastry, U. Shankar, and D. Wagner, “Secure verification of location
UDG connectivity model. We averaged the total number of claims,” in Proc. of the 2nd ACM workshop on Wireless security, 2003.
route acquisitions for 1000 runs. The results falls between [7] R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks
the lower and upper bounds from (2) verifying its accuracy. in wireless networks using connectivity information,” in Proc. of IEEE
INFOCOM, 2007.
The number of route acquisitions increase as the transmission [8] Y.-T. Hou, C.-M. Chen, and B. Jeng, “Distributed detection of worm-
range is increased because the number of neighbors of the node holes and critical links in wireless sensor networks,” in Proc. of IIHMSP,
increases. Thus, more nodes will send route acquisitions to the 2007.
[9] C. Lee and J. Suzuki, “Swat: A decentralized self-healing mechanism for
target node. Our simulations also showed that for R = 135 the wormhole attacks in wireless sensor networks,” In Y. Xiao, H. Chen and
average number of messages that need to be broadcast is 3.5. F. Li (eds.) Handbook on Sensor Networks, Chapter 24, World Scientific
Using the same parameters in equation (1) will result in 3 and Publishing, ISBN: 978-981-283-730-1, 2010.
[10] J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “Truelink: A
5 as the lower and upper bounds for the number of messages practical countermeasure to the wormhole attack in wireless networks,”
that need to be broadcast. All of these numbers are small and in Proc. of IEEE ICNP, 2006.
thus DeWorm needs very minimal overhead especially as it is [11] W. Wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against wormhole
attacks in mobile ad hoc networks: Research articles,” Wirel. Commun.
used only on demand. Mob. Comput., vol. 6, no. 4, pp. 483–503, 2006.
[12] X. Su and R. V. Boppana, “On mitigating in-band wormhole attacks in
E. Comparisons to other detection protocols mobile ad hoc networks,” in Proc. of IEEE ICC, 2007.
[13] Y.-C. Hu, A. Perrig, and D. Johnson, “Wormhole attacks in wireless
Here, we do not consider protocols that use location in- networks,” IEEE Journal on Selected Areas in Communications, vol. 24,
formation, time measurements, or special hardware. As we no. 2, pp. 370–380, 2006.
[14] I. Khalil, S. Bagchi, and N. B. Shroff, “Liteworp: Detection and isolation
discussed earlier, we used the exact same setup and models of the wormhole attack in static multihop wireless networks,” Comput.
that were used in [7]. The approach in [7] requires a higher Netw., vol. 51, no. 13, pp. 3750–3772, 2007.
node degree to achieve good performance, especially for [15] ——, “Mobiworp: Mitigation of the wormhole attack in mobile multihop
wireless networks,” Ad Hoc Netw., vol. 6, no. 3, pp. 344–362, 2008.
random topologies. For example, in one scenario with random [16] W. Wang and B. Bhargava, “Visualization of wormholes in sensor
node distribution and quasi-UDG connectivity model, results networks,” in Proc. of the 3rd ACM workshop on Wireless security,
in [7] for an average node degree around 4 showed that the 2004.
[17] R. Poovendran and L. Lazos, “A graph theoretic framework for pre-
detection percentage was between 50-65%. In our simulations, venting the wormhole attack in wireless ad hoc networks,” Wirel. Netw.,
DeWorm has a detection rate greater than 98% for a node vol. 13, no. 1, pp. 27–59, 2007.
degree of 3.6 and random node distributions. While this is [18] L. Qian, N. Song, and X. Li, “Detection of wormhole attacks in multi-
path routed wireless ad hoc networks: a statistical analysis approach,”
indicative of DeWorm’s excellent performance, we note that J. Netw. Comput. Appl., vol. 30, no. 1, pp. 308–330, 2007.
our simulations were not run on the same tool as in [7]. [19] D. Goyal and J. J. Caffery, “Partitioning avoidance in mobile ad hoc
networks using network survivability concepts,” in Proc. of IEEE ISCC,
2002.
VI. C ONCLUSIONS AND F UTURE W ORK [20] B. Milic and M. Malek, “Adaptation of the breadth first search algorithm
for cut-edge detection in wireless multihop networks,” in Proc. of .ACM
In this paper, we present DeWorm, a simple protocol for de- MSWiM, 2007.
tecting wormholes in ad hoc networks. This protocol employs [21] K.-I. Kim and S.-H. Kim, “Effectiveness of reliable routing protocols
routing discrepancies between neighbors to determine the in mobile ad hoc networks,” Wirel. Pers. Commun., vol. 38, no. 3, pp.
377–390, 2006.
existence of a wormhole. The protocol is localized, requires [22] M. Abolhasan, T. Wysocki, and E. Dutkiewicz, “A review of routing
only a small overhead, and does not have special requirements protocols for mobile ad hoc networks,” Ad Hoc Networks, vol. 2, no. 1,
such as location information, very high node degree, accurate pp. 1–22, 2004.
[23] M. Khabbazian, H. Mercier, and V. K. Bhargava, “Nis02-1: Wormhole
synchronization between nodes, special hardware etc. De- attack in wireless ad hoc networks: Analysis and countermeasure,” in
Worm was tested through exhaustive simulations for different Proc. of IEEE GLOBECOM, 2006.
distributions of nodes and wormholes and different connec- [24] I. Broustis, A. Vlavianos, P. Krishnamurthy, and S. Krishnamurthy, “Ctu:
Capturing throughput dependencies in uwb networks,” in Proc. of IEEE
tivity models. Under all the evaluated scenarios, DeWorm INFOCOM, 2008.
demonstrates excellent detection probabilities and few false [25] F. Kuhn and A. Zollinger, “Ad-hoc networks beyond unit disk graphs,” in
alarms, demonstrating its ability to detect wormholes in ad Proc. of the ACM joint workshop on Foundations of mobile computing,
2003.
hoc networks. Future work includes development of a protocol [26] V. Shah, E. Gelal, and S. V. Krishnamurthy, “Handling asymmetry in
for removal of the wormhole once detected and extension of power heterogeneous ad hoc networks,” Comput. Netw., vol. 51, no. 10,
DeWorm to more sophisticated wormhole cases. pp. 2594–2615, 2007.

80

Authorized licensed use limited to: Netaji Subhash Institute of Technology. Downloaded on February 3, 2010 at 05:55 from IEEE Xplore. Restrictions apply.

You might also like