Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm

Karlsson, Jonny; Dooley, Laurence S. and Pulkkis, Göran (2013). Identifying time measurement tampering in the traversal time and hop count analysis (TTHCA) wormhole detection algorithm. Sensors, 13(5) pp. 6651–6668.

DOI: https://doi.org/10.3390/s130506651

URL: http://www.mdpi.com/1424-8220/13/5/6651

Abstract

Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the measurements to the source node. In a participation mode (PM) wormhole where malicious nodes appear in the routing tables as legitimate nodes, the time measurements can potentially be altered so preventing TTHCA from successfully detecting the wormhole. This paper analyses the prevailing conditions for time tampering attacks to succeed for PM wormholes, before introducing an extension to the TTHCA detection algorithm called ∆T Vector which is designed to identify time tampering, while preserving low false positive rates. Simulation results confirm that the ∆T Vector extension is able to effectively detect time tampered MANET attacks, thereby providing an important security enhancement to the TTHCA algorithm.

Viewing alternatives

Download history

Metrics

Public Attention

Altmetrics from Altmetric

Number of Citations

Citations from Dimensions

Item Actions

Export

About