Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm

Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets du...

Full description

Bibliographic Details
Main Authors: Jonny Karlsson, Laurence S. Dooley, Göran Pulkkis
Format: Article
Language:English
Published: MDPI AG 2013-05-01
Series:Sensors
Subjects:
MHA
Online Access:http://www.mdpi.com/1424-8220/13/5/6651
id doaj-e8a6abe1eded458283a73679d085ddc1
record_format Article
spelling doaj-e8a6abe1eded458283a73679d085ddc12020-11-25T01:03:49ZengMDPI AGSensors1424-82202013-05-011356651666810.3390/s130506651Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection AlgorithmJonny KarlssonLaurence S. DooleyGöran PulkkisTraversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm.http://www.mdpi.com/1424-8220/13/5/6651mobile networksMANETMANET securityrouting securitywormhole attackhop countqueuing delaypacket processing timeTTHCAMHA
collection DOAJ
language English
format Article
sources DOAJ
author Jonny Karlsson
Laurence S. Dooley
Göran Pulkkis
spellingShingle Jonny Karlsson
Laurence S. Dooley
Göran Pulkkis
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
Sensors
mobile networks
MANET
MANET security
routing security
wormhole attack
hop count
queuing delay
packet processing time
TTHCA
MHA
author_facet Jonny Karlsson
Laurence S. Dooley
Göran Pulkkis
author_sort Jonny Karlsson
title Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
title_short Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
title_full Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
title_fullStr Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
title_full_unstemmed Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
title_sort identifying time measurement tampering in the traversal time and hop count analysis (tthca) wormhole detection algorithm
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2013-05-01
description Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm.
topic mobile networks
MANET
MANET security
routing security
wormhole attack
hop count
queuing delay
packet processing time
TTHCA
MHA
url http://www.mdpi.com/1424-8220/13/5/6651
work_keys_str_mv AT jonnykarlsson identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm
AT laurencesdooley identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm
AT goranpulkkis identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm
_version_ 1725199252190134272