Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets du...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2013-05-01
|
Series: | Sensors |
Subjects: | |
Online Access: | http://www.mdpi.com/1424-8220/13/5/6651 |
id |
doaj-e8a6abe1eded458283a73679d085ddc1 |
---|---|
record_format |
Article |
spelling |
doaj-e8a6abe1eded458283a73679d085ddc12020-11-25T01:03:49ZengMDPI AGSensors1424-82202013-05-011356651666810.3390/s130506651Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection AlgorithmJonny KarlssonLaurence S. DooleyGöran PulkkisTraversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm.http://www.mdpi.com/1424-8220/13/5/6651mobile networksMANETMANET securityrouting securitywormhole attackhop countqueuing delaypacket processing timeTTHCAMHA |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jonny Karlsson Laurence S. Dooley Göran Pulkkis |
spellingShingle |
Jonny Karlsson Laurence S. Dooley Göran Pulkkis Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm Sensors mobile networks MANET MANET security routing security wormhole attack hop count queuing delay packet processing time TTHCA MHA |
author_facet |
Jonny Karlsson Laurence S. Dooley Göran Pulkkis |
author_sort |
Jonny Karlsson |
title |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm |
title_short |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm |
title_full |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm |
title_fullStr |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm |
title_full_unstemmed |
Identifying Time Measurement Tampering in the Traversal Time and Hop Count Analysis (TTHCA) Wormhole Detection Algorithm |
title_sort |
identifying time measurement tampering in the traversal time and hop count analysis (tthca) wormhole detection algorithm |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2013-05-01 |
description |
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampering attacks, thereby providing an important security enhancement to the TTHCA algorithm. |
topic |
mobile networks MANET MANET security routing security wormhole attack hop count queuing delay packet processing time TTHCA MHA |
url |
http://www.mdpi.com/1424-8220/13/5/6651 |
work_keys_str_mv |
AT jonnykarlsson identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm AT laurencesdooley identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm AT goranpulkkis identifyingtimemeasurementtamperinginthetraversaltimeandhopcountanalysistthcawormholedetectionalgorithm |
_version_ |
1725199252190134272 |