SlideShare a Scribd company logo
WORMHOLE ATTACK DETECTION ALGORITHMS
IN WIRELESS NETWORK CODING SYSTEMS
ABSTRACT
Network coding has been shown to be an effective approach to improve the wireless
system performance. However, many security issues impede its wide deployment in practice.
Besides the well-studied pollution attacks, there is another severe threat, that of wormhole
attacks, which undermines the performance gain of network coding. Since the underlying
characteristics of network coding systems are distinctly different from traditional wireless
networks, the impact of wormhole attacks and countermeasures are generally unknown. In this
paper, we quantify wormholes’ devastating harmful impact on network coding system
performance through experiments. We first propose a centralized algorithm to detect wormholes
and show its correctness rigorously. For the distributed wireless network, we propose DAWN, a
Distributed detection Algorithm against Wormhole in wireless Network coding systems, by
exploring the change of the flow directions of the innovative packets caused by wormholes. We
rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We
perform analysis on the resistance of DAWN against collusion attacks.We find that the
robustness depends on the node density in the network, and prove a necessary condition to
achieve collusion-resistance. DAWN does not rely on any location information, global
synchronization assumptions or special hardware/middleware. It is only based on the local
information that can be obtained from regular network coding protocols, and thus the overhead
of our algorithms is tolerable. Extensive experimental results have verified the effectiveness and
the efficiency of DAWN.

More Related Content

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Vampire attacks draining life from wireless ad hoc sensor networks
PDF
Ii3415521555
PPTX
Wireless sensor network security
PPTX
Security in wireless sensor network
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
Ii3415521555
Wireless sensor network security
Security in wireless sensor network

What's hot (18)

DOCX
The three tier security scheme in wireless
PPT
security in wireless sensor networks
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PPT
Security and privacy in Wireless Sensor Networks
PPTX
Wireless Sensor Network
PDF
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
PPTX
Security in Wireless Sensor Network
PPTX
Wireless sensor network security issues
PPTX
Vampire attacks
PPTX
Secure and efficient data transmission for cluster based wireless sensor network
PPT
Wireless sensor Network using Zero Knowledge Protocol ppt
PPTX
6. security in wireless sensor netwoks
PDF
Secure data aggregation technique for wireless sensor networks in the presenc...
PPTX
Security issues and attacks in wireless sensor networks
PPTX
Wireless sensor network
PPTX
11011 a0449 secure routing wsn
PDF
Wireless sensor networks 2016-2017 titles
The three tier security scheme in wireless
security in wireless sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
Security and privacy in Wireless Sensor Networks
Wireless Sensor Network
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Security in Wireless Sensor Network
Wireless sensor network security issues
Vampire attacks
Secure and efficient data transmission for cluster based wireless sensor network
Wireless sensor Network using Zero Knowledge Protocol ppt
6. security in wireless sensor netwoks
Secure data aggregation technique for wireless sensor networks in the presenc...
Security issues and attacks in wireless sensor networks
Wireless sensor network
11011 a0449 secure routing wsn
Wireless sensor networks 2016-2017 titles
Ad

Viewers also liked (11)

PDF
Membership of Arab Parliament for Training Experts
PPT
Commemorating International Youth Day: Reproductive Health of Youth in Sub-Sa...
PDF
Pierre Cardin
PPTX
конкурс захисник вітчизни1
PDF
PPTX
Lewis symbol echon
PPT
evaluasi administrasi pendidikan
PDF
Die Multiplikationstabelle als innovative Learning-Analytics-Applikation
DOC
Marry christmas
PPT
интерактивный плакат
PPTX
Я-журналист
Membership of Arab Parliament for Training Experts
Commemorating International Youth Day: Reproductive Health of Youth in Sub-Sa...
Pierre Cardin
конкурс захисник вітчизни1
Lewis symbol echon
evaluasi administrasi pendidikan
Die Multiplikationstabelle als innovative Learning-Analytics-Applikation
Marry christmas
интерактивный плакат
Я-журналист
Ad

Similar to WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS (20)

PDF
Wormhole attack detection algorithms in wireless network coding systems
PDF
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
PDF
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
PDF
Wormhole attack mitigation in manet a
PDF
Elimination of wormhole attacker node in manet using performance evaluation m...
PDF
Wormhole Attack
PDF
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
PDF
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
PDF
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
PDF
SPECTRUM SHARING FOR 6G COMMUNICATION
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PPTX
Wormhole attack
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
Malicious attack detection and prevention in ad hoc network based on real tim...
PDF
D0961927
DOCX
A detection & prevention of wormhole attack in wsn project abstract
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PDF
Tqds time stamped quantum digital signature to defend
Wormhole attack detection algorithms in wireless network coding systems
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
Detection of Hidden Wormhole Attack in Wireless Sensor Networks Using Neighbo...
Wormhole attack mitigation in manet a
Elimination of wormhole attacker node in manet using performance evaluation m...
Wormhole Attack
IRJET-Impact of Worm hole Attack in Wireless Sensor Network
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Machine Learning Based Watchdog Protocol for Wormhole Attack Detection in Wir...
SPECTRUM SHARING FOR 6G COMMUNICATION
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Wormhole attack
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
D0961927
A detection & prevention of wormhole attack in wsn project abstract
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Tqds time stamped quantum digital signature to defend

More from I3E Technologies (20)

PPTX
Design of a low voltage low-dropout regulator
PPTX
An efficient constant multiplier architecture based on vertical horizontal bi...
PPTX
Aging aware reliable multiplier design with adaptive hold logic
PPTX
A high performance fir filter architecture for fixed and reconfigurable appli...
PPTX
A generalized algorithm and reconfigurable architecture for efficient and sca...
PPTX
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
PPTX
Reverse converter design via parallel prefix adders novel components, method...
PPTX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
PPTX
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
PPTX
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
PPTX
Ultrasparse ac link converters
PPTX
Single inductor dual-output buck–boost power factor correction converter
PPTX
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
PPTX
Resonance analysis and soft switching design of isolated boost converter with...
PPTX
Reliability evaluation of conventional and interleaved dc–dc boost converters
PPTX
Power factor corrected zeta converter based improved power quality switched m...
PPTX
Pfc cuk converter fed bldc motor drive
PPTX
Optimized operation of current fed dual active bridge dc dc converter for pv ...
PPTX
Online variable topology type photovoltaic grid-connected inverter
Design of a low voltage low-dropout regulator
An efficient constant multiplier architecture based on vertical horizontal bi...
Aging aware reliable multiplier design with adaptive hold logic
A high performance fir filter architecture for fixed and reconfigurable appli...
A generalized algorithm and reconfigurable architecture for efficient and sca...
A combined sdc sdf architecture for normal i o pipelined radix-2 fft
Reverse converter design via parallel prefix adders novel components, method...
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Energy optimized subthreshold vlsi logic family with unbalanced pull up down ...
Variable form carrier-based pwm for boost-voltage motor driver with a charge-...
Ultrasparse ac link converters
Single inductor dual-output buck–boost power factor correction converter
Ripple minimization through harmonic elimination in asymmetric interleaved mu...
Resonance analysis and soft switching design of isolated boost converter with...
Reliability evaluation of conventional and interleaved dc–dc boost converters
Power factor corrected zeta converter based improved power quality switched m...
Pfc cuk converter fed bldc motor drive
Optimized operation of current fed dual active bridge dc dc converter for pv ...
Online variable topology type photovoltaic grid-connected inverter

Recently uploaded (20)

PPTX
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
PPTX
Practice Questions on recent development part 1.pptx
PPTX
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
PPTX
web development for engineering and engineering
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
PPTX
Internship_Presentation_Final engineering.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
PDF
ETO & MEO Certificate of Competency Questions and Answers
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Simulation of electric circuit laws using tinkercad.pptx
PPTX
Road Safety tips for School Kids by a k maurya.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
MET 305 MODULE 1 KTU 2019 SCHEME 25.pptx
Practice Questions on recent development part 1.pptx
Fluid Mechanics, Module 3: Basics of Fluid Mechanics
web development for engineering and engineering
Structs to JSON How Go Powers REST APIs.pdf
OOP with Java - Java Introduction (Basics)
algorithms-16-00088-v2hghjjnjnhhhnnjhj.pdf
Internship_Presentation_Final engineering.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
ANIMAL INTERVENTION WARNING SYSTEM (4).pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
오픈소스 LLM, vLLM으로 Production까지 (Instruct.KR Summer Meetup, 2025)
ETO & MEO Certificate of Competency Questions and Answers
CH1 Production IntroductoryConcepts.pptx
Simulation of electric circuit laws using tinkercad.pptx
Road Safety tips for School Kids by a k maurya.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Lesson 3_Tessellation.pptx finite Mathematics

WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS

  • 1. WORMHOLE ATTACK DETECTION ALGORITHMS IN WIRELESS NETWORK CODING SYSTEMS ABSTRACT Network coding has been shown to be an effective approach to improve the wireless system performance. However, many security issues impede its wide deployment in practice. Besides the well-studied pollution attacks, there is another severe threat, that of wormhole attacks, which undermines the performance gain of network coding. Since the underlying characteristics of network coding systems are distinctly different from traditional wireless networks, the impact of wormhole attacks and countermeasures are generally unknown. In this paper, we quantify wormholes’ devastating harmful impact on network coding system performance through experiments. We first propose a centralized algorithm to detect wormholes and show its correctness rigorously. For the distributed wireless network, we propose DAWN, a Distributed detection Algorithm against Wormhole in wireless Network coding systems, by exploring the change of the flow directions of the innovative packets caused by wormholes. We rigorously prove that DAWN guarantees a good lower bound of successful detection rate. We perform analysis on the resistance of DAWN against collusion attacks.We find that the robustness depends on the node density in the network, and prove a necessary condition to achieve collusion-resistance. DAWN does not rely on any location information, global synchronization assumptions or special hardware/middleware. It is only based on the local information that can be obtained from regular network coding protocols, and thus the overhead of our algorithms is tolerable. Extensive experimental results have verified the effectiveness and the efficiency of DAWN.