ChinaCom2008-Network and Information Security Symposium

Research Article

Efficiently detecting wormhole attacks in sensor networks by information potential

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685119,
        author={Qin Li and Qingkai Zeng},
        title={Efficiently detecting wormhole attacks in sensor networks by information potential},
        proceedings={ChinaCom2008-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-NIS},
        year={2008},
        month={11},
        keywords={},
        doi={10.1109/CHINACOM.2008.4685119}
    }
    
  • Qin Li
    Qingkai Zeng
    Year: 2008
    Efficiently detecting wormhole attacks in sensor networks by information potential
    CHINACOM2008-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685119
Qin Li1,*, Qingkai Zeng1,*
  • 1: State Key Laboratory for Novel Software Technology Department of Computer Science and Technology Nanjing University, China Telephone: 025-83686700
*Contact email: liqin@dislab.nju.edu.cn, zqk@nju.edu.cn

Abstract

Several protocols have been proposed to defend against wormhole attacks in sensor networks by adopting cryptographic methods, packet leashes, directional antennas, or visualization, etc. In this paper, we propose a local energy-efficient method to detect wormhole attacks. This method can be applied in sensor networks with metric-based routing protocols and is independent of data aggregation. We define two parameters, said to be potential and gradient respectively. The former is to describe the intensity of attraction of a node to information flow in sensor networks, and the later is to describe the increase rate of potential from children node to parent node. A node with overmuch potential and gradient over its children will be suspect by their sons, and then these sons will tell whether their parent are malicious with the help of the algorithm proposed to estimate neighborhood potential configuration. A malicious node will be found out because its potential is a local maximum in its neighborhood. We simulate the procedure of potential computing and analyze the performance of the method.