13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

146 J. Zhen and S. Sr<strong>in</strong>ivasbeg<strong>in</strong>n<strong>in</strong>g of form<strong>in</strong>g the network, each neighbor is set as trusted because weassume that there is no replay attack <strong>in</strong> that moment due to the spontaneousnature of the ad-hoc network. From then on, nodes move around across differentnodes’ transmission range. Upon receiv<strong>in</strong>g a RREQ from an un-trusted node,or “neighbor”, a node will send a verification message and wait for the reply.Only after the node has approved the neighbor from its RTT value, the RREQ isforwarded cont<strong>in</strong>uously. It seems that this will <strong>in</strong>crease the RREQ propagationdelay for several folds, but our analysis will show this is not the case becausethe RREQ is broadcast and the path go<strong>in</strong>g through the trusted nodes have lessresistance while verifications are be<strong>in</strong>g made on other paths.Because RTT is such a variable value depend<strong>in</strong>g on node capability andtraffic load, we measure the local average RTT as the threshold. A new RTTto an un-trusted neighbor will be compared with this threshold for accept<strong>in</strong>g orreject<strong>in</strong>g. Basically, the threshold at a node equals the average RTT to its alltrusted neighbors.In order to attack successfully, the RREQ replay attack must be appliedon the nodes far away from the orig<strong>in</strong>ator because nodes around the orig<strong>in</strong>atorhave the freshest <strong>in</strong>formation. And the wormhole attack can form more seriousharm when applied on larger range because this makes attackers have morecontrol on the traffic. This large straddle necessitates at least two attackers;otherwise, one attacker will have to use powerful signals which will be heard <strong>by</strong>a large group of the nodes. By compar<strong>in</strong>g neighbor lists among them to f<strong>in</strong>dthe abnormal common neighbor, we would be able to detect this attack. The<strong>in</strong>volvement of two attackers <strong>in</strong>creases the possibility of detect<strong>in</strong>g replays <strong>by</strong>compar<strong>in</strong>g RTT times. Even though these attackers have powerful equipment,MAC delays depend only on local traffic. We assume that two attackers will makeRTT remarkablely different between attacked scenarios and normal situation.4.2 Verification ProcedureThe verification procedure used to measure RTT between two nodes send<strong>in</strong>g/receiv<strong>in</strong>g RREQ is illustrated <strong>in</strong> Fig.3. We assume that we have an efficient wayto distribute a secret between each pair of nodes such that A and B share akey Kab. The random number is generated uniquely for each verification procedureto prevent replayed verification reply (VEF REP). IPa and IPb are IPaddresses of A and B. They are added to dist<strong>in</strong>guish between the direction ofA-B and B-A, otherwise anyone hear<strong>in</strong>g VEF REQ message can replay it backto forge a VEF REP. Even though IP addresses are public, without Kab, nodesother than B cannot forge VEF REP’s to A. Each packet must be signed orencrypted depend<strong>in</strong>g on its efficiency because we need a mechanism for A andB to authenticate each other.4.3 ThresholdWe base the calculation of RTT threshold value on the Hello message exchange<strong>in</strong> AODV protocol. Accord<strong>in</strong>g to the protocol, nodes are required to broadcast

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!