Felipe Téllez and Jorge Ortiz ,: Manuscript Received September 20, 2011 Manuscript Revised September 25, 2011
Felipe Téllez and Jorge Ortiz ,: Manuscript Received September 20, 2011 Manuscript Revised September 25, 2011
Felipe Téllez and Jorge Ortiz ,: Manuscript Received September 20, 2011 Manuscript Revised September 25, 2011
9, September 2011
Behavior of Elliptic Curve Cryptosystems for the Wormhole Intrusion in MANET: A Survey and Analysis
Felipe Tllez and Jorge Ortiz ,
National University of Colombia, Bogot D.C., Colombia Summary
This article presents a study about the performance with different applications of Elliptic Curve Cryptography in Wireless Mobile Ad-Hoc Networks (MANET) to determine their effectiveness in security during the Wormhole intrusion. The aim is to provide answers to questions like: Is it an elliptic curve cryptosystem applied to Ad-Hoc networks sufficient to prevent, detect, evade and/or eliminate Wormhole attacks? If not, should it live with any of the proposals that have already been raised to counteract this attack?, What is the behavior of the various solutions of this type of cryptography, which claim to offer security, when are confronted with a Wormhole tunnel? We present a state of the art about Wormhole, the different types that exist, and the proposed solutions to counter it are classified. We review the various solutions based on Elliptic Curve Cryptography posed to security in Ad-Hoc networks and then analyze their performance against the requirements to be met when providing security against malicious tunnel. In the end, is expected to conclude as cryptography, and especially for this study, the elliptic curves, ensures security against Wormhole tunnel.
By intercepting packets, the attacker could practically do with them as he pleases. Many proposals to counter this type of attack have been raised. Some proposals have been of physical type [4]. Others are focused on how to attack the intruder from the network's geographic area (location of the nodes, distances between them, location of failures), [3], [5], [8], other by analysis of the transmission times of nodes [7], [9] and other focused on monitoring routing [10]. Some studies even say that while there is a system of authentication and encryption, the attack can be carried out [2], [3]. Based on these studies, several questions arise: What happens then to all the proposed solutions based on Elliptic Curve Cryptosystems (ECC) and applied to AdHoc networks that claim to guarantee security in such networks? Can an ECC applied to Ad-Hoc networks alone prevent, detect, evade and / or eliminate a Wormhole attack?, If not, is it necessary to satisfy the criteria of integrity, authentication, non-repudiation and application availability combine a cryptosystem with some of the solutions already proposed to attack the Wormhole intrusion?. Our contribution:
Key words: Ad-Hoc, Wormhole Intrusion, Elliptic Curve Cryptography, Performance Analysis, State of the Art, MANET Security.
1. Introduction
A MANET (Mobile Ad-Hoc Network) [1] is a set of autonomous and spontaneous routers or mobile nodes that communicate with each other through wireless connections, where there is no fixed network infrastructure and management is done distributed. That's how the nodes are involved in routing algorithms and security. To the features of these important and useful networks such as the limited ability to process the nodes with high bandwidth connections scarce, dynamic topology and power constraints must be added vulnerability to attacks from intruders. Security in these networks is a challenge, even more when it comes to intrusions as Wormhole tunnel. Wormhole is an attack on the routing protocol of the network where 2 colluder nodes or more intercept packets of information while traveling at a point A of the network, and quickly reinserted in another physical point B in the same network creating a "tunnel "from A to B [3]. This study compiles a comprehensive state of the art on Wormhole and ECC in MANET, in order to further analyze the behavior of ECC against this intrusion. But, Why ECC? Today, it is becoming increasingly common the implementation of the Elliptic Curve Cryptography (ECC) for Ad-Hoc networks, because compared to cryptosystems such as RSA, ECC offers equivalent security level with smaller key sizes, faster computing, with low power and memory consumption and savings in bandwidth [11], which are precisely the characteristics that make it attractive to apply in this type of networks with limited resources [12]. For this reason this study focuses on assessing the level of security offered by these new proposals based on elliptic curve cryptography for Wormhole intrusion. The remainder of this paper is structured as follows: Section 2 presents a state of the art of Wormhole intrusion, the actions it can perform on Ad-Hoc networks, Wormhole
Manuscript received September 20, 2011 Manuscript revised September 25, 2011
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
types and classification of the proposed solutions to counter this attack. Section 3 introduces the concept of Elliptic Curve Cryptography. Section 4 lists the protocols and the different solutions that have been proposed based on ECC to ensure security as well as its advantages when applied in MANET. Section 5 lists the requirements to be satisfied by an ECC system to prevent, detect, evade and/or delete a wormhole attack and an analysis of compliance of these requirements in the ECC's proposed related work for countering the attack. Section 6 shows the conclusions. Section 7 lists possible directions for future work. Finally, Section 8 lists the references in this study.
2. Wormhole Attack
2.1 Definition
A Wormhole is an attack against the routing protocol [2] in a MANET where two or more nodes create the illusion that two remote regions of the network are directly connected through nodes that appear to be neighbors, but they are actually distant to each other [13]. This shortcut is created by connecting the apparent neighbors through a secret communication channel or tunnel, which is generated by an attacker that introduces transceivers connected to each other with a high quality, low-latency link [4]. In this way, the attacker takes the transmitted packets in one region and reinsert them into another region.
- Eavesdrop on communication: Process for intercepting packets flowing on the network. - Spoofing attack: Inject bogus packets, impersonating another sender. - Record packets: Using eavesdropping on communication, are generated copies of intercepted packets flowing on the network. - Replay the packets: Passively can re-inserting the packets elsewhere on the network. Actively follow the same process but altering the intercepted packets. - Unauthorized Access: The malicious node enters to a group or subgroup of nodes, masquerading as a belonging node to the network. - Disrupt routing: In the route discovery process the attack generates interruption of the normal flow of the protocols in the search for a valid path. One consequence of this attack can be a Sinkhole attack [60] where modifying routing packets and masquerading as a trusted node, the attacker attracts other nodes so that all traffic passes through it, in order to launch after centralized attacks. - Denial-of-Service (DoS): After having supplanted as reliable nodes that contain valid routes to send packets, malicious nodes discard all messages received and not sent to the destination node. This attack is also known as Black Hole Attack [61]. - Selectively discarding data packets: It is a Black Hole Attack but not drop all the intercepted packages, only some of them. This attack is known as Gray Hole Attack [61]. - Clandestine traffic analysis [2]: At a given time t the Wormhole tunnel obtained the traffic statistics from the network to use them against it. - Creating routing loops [4]: To waste the energy of the network. The attack directly affects the network routing protocols both reactive and proactive routing. [3]. In Reactive protocols: According to [3], when the network uses on-demand routing protocols such as AODV or DSR, the attacker can penetrate into the route discovery process tunneling each ROUTE REQUEST packet directly to the destination target node of the REQUEST. The destination node receiving the message RREQ, it answers to attacker who is impersonating a trusted node. Being able to interconnect two different regions of the network, the attacker becomes a preferred node for the route discovery process by making the destination node discards the other received ROUTE REQUEST. In Proactive protocols: For protocols such as DSDV, several colluding Attackers can create a tunnel through which pass Each advertisement Sent by routing nodes within the network. This will make two nodes far apart to believe that they are neighbors. In
Fig 1. Intrusion in Ad-Hoc Network with Wormhole Tunnel: X and Y represent the Wormhole nodes connected through a tunnel that creates the illusion that region 1 and region 2 are directly connected, making believe that A is a neighbor node of J.
The attacker is invisible in the upper layers, unlike a malicious node in a routing protocol, which can easily be identified, the presence of the Wormhole and the attackers involved in the endpoints of the tunnel are not visible on the route [3].
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
determining the best number of hops required for communication, the nodes within the network end up relying on colluder nodes and there attacks occur. According to previous studies, these consequences of the attack could be implemented even if there is a system used for authentication and encryption in the network [2], [3]. That is, ensure that a cryptosystem is not enough to counter a Wormhole attack. This is precisely the rationale for this article: Analyze these assertions and from them to study the recent implementation of the ECC to verify their behavior to an attack such as Wormhole. -
2. -
known as Hidden Wormhole Attack [15], using only hardware introduced by the attacker and without compromising any hosts in the network. The Out-ofband concept initially was introduced in [3]. In-band wormholes: An in-band wormhole does not require any additional hardware infrastructure. It consumes existing communication medium capacity for routing the tunneled traffic. Thus, the belonging nodes on the network will be involved in the attack. The In-band concept initially was introduced in [13] although it has been studied in another as [16], [17] and [18]. According to [13], this type of attack is subdivided into 2 types: Self-contained in-band wormhole and Extended in-band wormhole. Self-contained in-band Wormhole: Is a subtype of Inband wormhole. Using the resources of the network and involving other nodes within the network, intruders create a false link between the attacker nodes themselves. Extended in-band Wormhole: Also known as Exposed Wormhole Attack [15] and also known as Byzantine Wormhole Attack [19], is another subtype of In-band Wormhole. Creates a wormhole that extends beyond the attackers forming the tunnel endpoints. A false link is advertised between two nodes that are not the attacker nodes.
3. -
Based on these symptoms [20], knowing that the tunnel is an attack against the routing protocol in the network [2], and taking the related works mentioned in [25], [26] and [27], we classify the proposed solutions against Wormhole attack in: - Location-based, Distance-based and Time-based - Hop-Count Analysis - Graph-based and Geometric-based - Neighbor monitoring-based - Statistical - Key-based 1. Location-based, Distance-based and Time-based That kind of proposals are based on clock synchronization, flags or marks on packets and use of additional hardware such as GPS, ultrasound or antennas in order to analyze geographic location of nodes in a network, measuring the
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
distance between transmitter and receiver, and measurement transfer latencies of the packets to determine speed of reception and communication and to catalog some as suspicious that they are possibly Wormhole tunnels. Among the solutions are: [3], [4], [9], [10], [15], [19], [72]. 2. Hop-count Analysis These are proposals that examine the number of hops that requires transmission of a packet from a source node to a destination node in order to analyze the probability of a Wormhole attack when the number of hops is unusual. Among the proposals are: [28] and [29]. 3. Graph-based and Geometric-based These solutions propose to construct graphical models of network links based on the transmission range of nodes, in order to determine what types of communications are allowed and which not, based on a graphic model or geometric pattern. Some of them are: [5], [8], [27]. 4. Neighbor monitoring-based Is the analysis of the behavior of neighboring nodes, when each belonging node on the network participates in the routing process, where is validate in their routing lists, the confidence level of the neighbor node with whom it is communicating. Among the solutions are: [8], [20]. 5. Statistical Proposals are described as through statistical analysis based on calculating the number of routes generated during routing with the frequency of occurrence of these can be detected in the observation of unusual behavior to the possible existence of a Wormhole tunnel. Some of these proposals are: [38], [39]. 6. Key-based Proposals are based on authentication between nodes that require additional geographic component to determine the location of the nodes and to identify possible locations between authentication and intrusion. An example is: [40] (Note that this type of authentication solution requires additional security component).
An elliptic curve is a plane curve defined by a cubic equation (third degree) as: + + = + + + (1) For example, a representation of an elliptic curve over the field of real numbers would be as Figure 2.
Where the curve A is the representation of equation (1) with a1=a2=a3=0; a4 =-1; a5=1 and curve B is the representation of equation (1) with a1=a2=a3=a5=0; a4 =1, i.e.: Curve A: y = x x + 1 Curve B: y = x x According to [48] there are some preliminary considerations to be taken into account before implementing the Elliptic Curve Digital Signature Algorithm (ECDSA), however in this review we shall take them in general for any application of ECC. Considerations involve choosing: 1. A Type of underlying finite field q (p or 2m). [45] 2. A Field representation (Polynomial or Normal Basis for 2m) and the definition of the operations in computational levels (see figure 3). 3. A Type of elliptic curve E over q (Random curve or Koblitz curve) [52] and their Domain Parameters [49-51] 4. An Elliptic curve point representation (Affine Coordinates or Projective coordinates). [46], [54-57].
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
pm where p is prime are called Galois Fields (GF), or also known as GF(p), GF(2m), and GF(pm), respectively. In a field p, an elliptic curve E over p, denoted E(p), is defined by the equation of the form: y2 x3 + ax + b (mod p) (2) where p is an odd prime, and a, b p, satisfy: 4a3 + 27b2 <> 0 (mod p) (3) Denote now an extra point on the curve at an infinitely place above the vertical axis and that is the identity of the elliptic curve group, such that added it to any point P results the point P. This point is called the point at infinity . Thus the set E(p) with point is the set of all solutions or points P = (x,y), for x,y p that satisfy the equation (2). On the other hand, taking the finite field of Galois 2m, which consists of the two elements 0 and 1, with m 1 an elliptic curve E (not supersingular) over 2m, denoted E(2m), is defined by the equation of the form: y2+ xy= x3 + ax2 + b on 2m (4) where a, b 2m, b 0 on 2m and E(2m) is the set of all solutions or points P = (x ,y), for x,y 2m that satisfy the equation (4), with the point at infinity . The elements of a finite field 2m with m 1 can be represented by all binary polynomials of degree m - 1 as follows [48]:
= + + + + | 0,1
(5) This representation makes these fields are very useful for applications in cryptography, since its elements fit neatly into a data word length of m bits of the form . For example a point A 24 is a 4-bit binary word such that A = (a a aa ) (0000).
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
elliptic curve discrete logarithms are much less efficient than those for factoring or computing conventional discrete logarithms and it indicates that more computation time is required for ECC and considers that the overall performance of ECDLP-based applications needs to be evaluated. However, compared to many other conventional cryptosystems, ECC is a very good alternative to the characteristics of a MANET.
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
organization, or [70] with Threshold organization. Another proposals applying ECC in MANET with Key Management are: [6], [53], [73 76]. Some proposals use Key Agreement Protocols as [47] that seeks resist the offline password guessing attack, others simply apply ECDH in its Key Agreement Protocol as [37]. Other proposals applying ECC in MANET with Key Agreement are [64] and [36]. C. By the use of MANET as a way of implementation and improvement of ECC: Some proposals study the application of software libraries to implement ECC on MANET as [63] and [35]. In [34] is presented a fuzzy controller for a dynamic window sizing to optimize the calculation of an ECC scalar multiplication and evaluate their performance in MANET. In [33] is sought through the code development over some microcontrollers the optimization faster implementation of an ECC in MANET. In [42] is compared the application of ECC versus RSA in MANET in order to observe their strengths and in [59] shows how some ECC implementations have some limitations on MANET performance.
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
-Communication efficiency: This includes the number of passes (message exchanges) and the bandwidth required (total number of bits transmitted).
defeated if a node is compromised and the attacker has access to secured information. Let's analyze these assertions: Is it possible that an ECC is the only efficient way of security within an Ad-Hoc network?: The answer is No. As discussed in this paper (Section 5.2): in [30] and [24] must take into account three key aspects when implementing a security policy in Ad-Hoc networks: Intrusion Detection, Secure Routing and Key Management Service. The ECC would be involved only in the Key Management Service process. Are the proposed ECC able to satisfy the Security Requirements in MANETs presented in section 5.1?: The only requirements to be satisfy with applied ECC in MANET, are those of Authentication and the Confidentiality, since they are precisely the functions of any cryptosystem in MANET, however, cannot be guaranteed the remaining requirements, being that Wormhole attack directly affects the Routing process [3] and the attacker can carry out Denial of Service (Not would be met Non-repudiation neither Availability), packet alteration (Not would be met Integrity), or Disrupt routing and Spoofing attack (Not would be met Access and usage control). Could "the current proposals for ECC" satisfy the Attributes of a Key Management Service (Section 5.3) in middle of a wormhole attack?: The ECC attributes that are affected in a negative way with a Wormhole intrusion are: Key-compromise impersonation, Loss of information and Message independence. As discussed in Section 2.2 of this paper are precisely the characteristics of the wormhole that affect these attributes. Wormhole is able to impersonate a node pretending to be reliable, to impersonate a node has the ability to share information with members of the network nodes and even participate in a Key Establishment Process. At this point it does lose the Message Independence, because there is communication between a malicious node and a belonging node on the network. Information loss occurs with packet capture by malicious nodes and the attacker's ability to do with them as it pleases. However, revisiting some of the proposals of Related Work some important things can be seen: In [64] can be guaranteed Key-compromise impersonation, considering the organization of the network into groups and sub-groups. This makes the nodes know each other, despite being limited organization considering a node outside the network will make it harder to belong to it, however, prevent the rapid generation of a Wormhole tunnel. In addition, it would satisfy the Computational efficiency and Communication efficiency attributes, because as we saw in Section 4.3, the implementation of the GECDH and TGECDH protocols have better
5.5. Analysis
As we saw in section 2 of this paper, some previous studies have stated that applied to MANET, the cryptosystems are not enough to counter a Wormhole attack. For example [3] states: The attack can also still be performed even if the network communication provides confidentiality and authenticity, and even if the attacker has no cryptographic keys or as in the case of [2] where says: Also some approaches rely on using source authentication using signing keys. Such defenses can be
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
performance than other traditional cryptography schemes. In the same way happen with the Cluster-based organization proposals, e.g.: [65], [66] and [67], such organizations can avoid impersonation given the high level of reliability between neighboring nodes and distrust generated by the entry of a new node to the network, have their advantages and disadvantages. The ECC proposals that are applied to MANET Can they perform the actions carried out in the levels of security against Wormhole attack (section 5.4)? The answer is No. The actions and strategies that fall within these security levels are not exactly an ECC task, but an Intrusion Detection System. If the ECC application in MANET is not sufficient to offset the Wormhole Attack, Should it be combined with other solutions so that it can be applied? The answer is Yes. As we saw previously an ECC application is part of the Key Management Service, but it requires being mixed with "Intrusion detection Systems" and "Secure routing solutions" to attack the Wormhole intruder. In fact, some proposals that apply ECC in their solutions, combine it with other strategies: For example in [67] it is performed an estimation of trust values of neighbors, a Secure end-toend route discovery using Antnet routing mechanism is carried out and it is mixed with mutual authentication using ECC. Such combinations prevents many of the actions of a wormhole attack and there is used an ECC.
design and propose solutions that combine the three aspects of security in MANET: Intrusion Detection, Secure Routing and Key Management Service, implementing an ECC within the Key Management Service aspect to attack the Wormhole intrusion.
8. References
[1] S. Corson, J. Macker, Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, IETF RFC 2501, January 1999. [2] Mahajan, V.; Natu, M.; Sethi, A.; , "Analysis of wormhole intrusion attacks in MANETS," Military Communications Conference, 2008. MILCOM 2008. IEEE , vol., no., pp.1-7, 16-19 Nov. 2008. [3] Hu, Y.-C.; Perrig, A.; Johnson, D.B.; , "Packet leashes: a defense against wormhole attacks in wireless networks," INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies , vol.3, no., pp. 1976- 1986 vol.3, 30 March-3 April 2003. [4] L. Hu and D. Evans, Using directional antennas to prevent wormhole attacks, in: Proceedings of NDSS (Feb. 2004). [5] Lazos, L.; Poovendran, R.; Meadows, C.; Syverson, P.; Chang, L.W.; , "Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach," Wireless Communications and Networking Conference, 2005 IEEE , vol.2, no., pp. 1193- 1199 Vol. 2, 13-17 March 2005. [6] Dahshan, H.; Irvine, J.; , "An Elliptic Curve Distributed Key Management for Mobile Ad Hoc Networks," Vehicular Technology Conference (VTC 2010-Spring), 2010 IEEE 71st , vol., no., pp.1-5, 16-19 May 2010. [7] Gorlatova, M.A.; Mason, P.C.; Wang, M.; Lamont, L.; Liscano, R.; , "Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Military Communications Conference, 2006. MILCOM 2006. IEEE , vol., no., pp.1-7, 23-25 Oct. 2006. [8] Sun Choi; Doo-young Kim; Do-hyeon Lee; Jae-il Jung; , "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks," Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on , vol., no., pp.343-348, 11-13 June 2008. [9] Nait-Abdesselam, F.; , "Detecting and avoiding wormhole attacks in wireless ad hoc networks," Communications Magazine, IEEE , vol.46, no.4, pp.127-133, April 2008. [10] S. Capkun, L. Buttyan, and J. Hubaux, SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.1-12, Washington, USA, Oct 2003. [11] V. Katiyar, K. Dutta, S. Gupta; A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment. International Journal of Computer Applications 11(10):41 46, December 2010.
6. Conclusions
Elliptic Curve Cryptography (ECC) is a good choice to implement authentication and information security in MANET, since it has features that make it viable when used in networks with limited resources. However, the implementation of an ECC is not enough to counter the Wormhole attack. It is necessary to combine these security and authentication methods with other approaches like: intrusion detection systems and secure routing algorithms. Such combinations will make not only to counter an attack as complex and dangerous as the Wormhole, but should be set very high levels of security against other attacks. In this paper, we have done a very broad survey about the Wormhole attack and the application of ECC in MANET in order to conclude that, in terms of ensuring security in MANET, ECC is not sufficient but necessary.
7. Future Work
Would be important to supplement the conclusions of this study, develop simulations of different ECC applications in MANET and analyze the behavior with a simulated Wormhole showing results that confirm this study. Also
10
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
[12] Vanstone, S.A., Next generation security for wireless: elliptic curve cryptography, Elsevier, Computers and Security, Vol. 22, No. 5, July 2003, 412-415. [13] Kruus, Peter; Sterne, Dan; Gopaul, Richard; Heyman, Michael; Rivera, Brian; Budulas, Peter; Luu, Brian; Johnson, Tommy; Ivanic, Natalie; Lawler, Geoff; , "In-Band Wormholes and Countermeasures in OLSR Networks," Securecomm and Workshops, 2006 , vol., no., pp.1-11, Aug. 28 2006-Sept. 1 2006. [14] M. Azer, S. El-Kassas, and M.M.S. El-Soudani, "A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks", presented at CoRR, 2009. [15] Xia Wang; Wong, J.; , "An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks," Computer Software and Applications Conference, 2007. COMPSAC 2007. 31st Annual International , vol.1, no., pp.39-48, 24-27 July 2007. [16] C. Adjih, T. Clausen, A. Laouiti, P. Muhlethaler, D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network", Institut National de Recherche en Informatique et en Automatique", ISRN INRIAR/RR-54-94, February 2005. [17] Khalil, I.; Saurabh Bagchi; Shroff, N.B.; , "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on , vol., no., pp. 612- 621, 28 June-1 July 2005. [18] R. Gopaul, P. Kruus, D. Sterne, and B. Rivera, "Gravitational analysis of the in-band wormhole phenomenon", Proc. 25th Army Science Conference, Orlando, FL, Nov. 2007. [19] Eriksson, J.; Krishnamurthy, S.V.; Faloutsos, M.; , "TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks," Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on , vol., no., pp.75-84, 12-15 Nov. 2006. [20] Gunhee Lee; Dong-kyoo Kim; Jungtaek Seo; , "An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks," Information Security and Assurance, 2008. ISA 2008. International Conference on , vol., no., pp.220-225, 24-26 April 2008. [21] Senthilkumar G Cheetancheri.; , "Modelling a Computer Worm Defense System.", Masters thesis for B.E. Computer Science & Engineering. Coimbatore Institute of Technology, Coimbatore, India. (1998). [22] Abi-Char, P.E.; Mhamed, A.; El-Hassan, B.; , "A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography," Information Assurance and Security, 2007. IAS 2007. Third International Symposium on , vol., no., pp.89-94, 29-31 Aug. 2007. [23] Brutch, P.; Ko, C.; , "Challenges in intrusion detection for wireless ad-hoc networks," Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on , vol., no., pp. 368- 373, 27-31 Jan. 2003. [24] Z. Yan, P. Zhang, and T. Virtanen, Trust Evaluation Based Security Solution in Ad Hoc Networks, The Seventh
Nordic Workshop on Secure IT Systems, NordSec 2003, Gjovik, Norway, 10, 2003. [25] Azer, M.A.; El-Kassas, S.M.; El-Soudani, M.S.; , "Immuning Routing Protocols from the Wormhole Attack in Wireless Ad Hoc Networks," Systems and Networks Communications, 2009. ICSNC '09. Fourth International Conference on , vol., no., pp.30-36, 20-25 Sept. 2009. [26] Qiu Xiu-feng; Liu Jian-wei; Sangi, A.R.; , "MTSR: Wormhole attack resistant secure routing for Ad hoc network," Information Computing and Telecommunications (YC-ICT), 2010 IEEE Youth Conference on , vol., no., pp.419-422, 28-30 Nov. 2010. [27] Maheshwari, R.; Jie Gao; Das, S.R.; , "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information," INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE , vol., no., pp.107-115, 6-12 May 2007. [28] Jen, S. M., Laih,. C.S., and KuoW,. C. A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors2009. [29] Zeng, Yingpei; Zhang, Shigeng; Guo, Shanqing; Li, Xie; , "Secure Hop-Count Based Localization in Wireless Sensor Networks," Computational Intelligence and Security, 2007 International Conference on , vol., no., pp.907-911, 15-19 Dec. 2007. [30] Zheng Yan, Security in Ad Hoc Networks, Networking Laboratory, Helsinki University of Technology, 2002. [31] Abusalah, L.; Khokhar, A.; Guizani, M.; , "A survey of secure mobile Ad Hoc routing protocols," Communications Surveys & Tutorials, IEEE , vol.10, no.4, pp.78-93, Fourth Quarter 2008. [32] S. Blake-Wilson, D. Johnson, and A. Menezes, Key Agreement Protocols and Their Security Analysis, in Proc. IMA Int. Conf., 1997, pp.30-45. [33] B. Erik-Oliver, M. Zitterbart, Efficient Implementation of Elliptic Curve Cryptography for Wireless Sensor Networks, Telematics Technical ReportsTM-2005-1, 2005 [34] Xu Huang; Sharma, D.; , "Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication," Communications (APCC), 2010 16th Asia-Pacific Conference on , vol., no., pp.458-463, Oct. 31 2010-Nov. 3 2010. [35] Wang Wei-hong; Lin Yu-bing; Chen Tie-ming; , "The study and application of elliptic curve cryptography library on wireless sensor network," Communication Technology, 2008. ICCT 2008. 11th IEEE International Conference on , vol., no., pp.785-788, 10-12 Nov. 2008. [36] Zhang Li-Ping; Cui Guo-Hua; Yu Zhi-Gang; , "An Efficient Group Key Agreement Protocol for Ad Hoc Networks," Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on , vol., no., pp.1-5, 12-14 Oct. 2008. [37] Du Congwei; Li Rongsen; Dou Wenhua; , "An efficient key agreement protocol in cluster-based MANETs," Computer Application and System Modeling (ICCASM), 2010
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.9, September 2011
11
International Conference on , vol.10, no., pp.V10-627-V10630, 22-24 Oct. 2010. [38] Song, N.; Qian, L.; Li, X.; , "Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach," Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International , vol., no., pp. 8 pp., 4-8 April 2005. [39] L. Buttyn, L. Dra, I. Vajda, "Statistical Wormhole Detection in Sensor Networks", Second European Workshop on Security and Privacy in AdHoc and Sensor Networks (ESAS 2005), Visegrd, Hungary, July 1314,2005,pp. 128-141. [40] Yanchao Zhang; Wei Liu; Wenjing Lou; Yuguang Fang; , "Securing sensor networks with location-based keys," Wireless Communications and Networking Conference, 2005 IEEE , vol.4, no., pp. 1909- 1914 Vol. 4, 13-17 March 2005. [41] Xu Huang; Shah, P.G.; Sharma, D.; , "Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange," Network and System Security (NSS), 2010 4th International Conference on , vol., no., pp.588-593, 1-3 Sept. 2010. [42] Jia Xiangyu; Wang Chao; , "The application of elliptic curve cryptosystem in wireless communication," Microwave, Antenna, Propagation and EMC Technologies for Wireless Communications, 2005. MAPE 2005. IEEE International Symposium on , vol.2, no., pp. 1602- 1605 Vol. 2, 8-12 Aug. 2005. [43] Yong Wang; Ramamurthy, B.; Xukai Zou; , "The Performance of Elliptic Curve Based Group Diffie-Hellman Protocols for Secure Group Communication over Ad Hoc Networks," Communications, 2006. ICC '06. IEEE International Conference on , vol.5, no., pp.2243-2248, June 2006. [44] N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation,vol. 48, no.177, pp.203-209, Jan 1987. [45] A. Jurisic and A.J. Menezes, Elliptic curves and cryptography, Dr. Dobbs Journal, pages 26-35, April 1997. [46] D. Hakerson, A. Menezes, and S. Vanston, "Guide to Elliptic Curve Cryptography," Springer-Verlag New York, Inc., Secaucus, NJ, USA, (2004). [47] Chin-Chen Chang; Shih-Chang Chang; , "An Improved Authentication Key Agreement Protocol Based on Elliptic Curve for Wireless Mobile Networks," Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on , vol., no., pp.1375-1378, 15-17 Aug. 2008. [48] D. Johnson and A. Menezes, The elliptic curve digital signature algorithm (ECDSA), Technical report CORR 9934, University of Waterloo, 2000. [49] Nippon Telephone and Telegraph Corporation; SEC X.1 Supplemental Document for Odd Characteristic Extension Fields, June, 2008. [50] Standards for Efficient Cryptography Group, "SEC 1: EllipticCurve Cryptography", May 2009, <http://www.secg.org/download/aid-780/sec1-v2.pdf>.
[51] Standards for Efficient Cryptography Group; "SEC 2: Recommended Elliptic Curve Domain Parameters"; September 2000. V1.0; <http://www.secg.org/download/aid386/sec2_final.pdf>. [52] National Institute of Standards and Technology; Digital Signature Standard (DSS), FIPS Publication 186-2, 2000. [53] Huaqun Wang; Shuping Zhao; Guoxing Jiang; , "Key Management Based on Elliptic Curve Paillier Scheme in Ad Hoc Networks," Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007. SNPD 2007. Eighth ACIS International Conference on , vol.1, no., pp.116-119, July 30 2007-Aug. 1 2007. [54] A. Menezes, Elliptic Curve Public Key Cryptosystems, Kluwer Academic Publishers, Dordrecht, 1993. [55] "IEEE Standard Specifications for Public-Key Cryptography," IEEE Std 1363-2000 , vol., no., pp.i, 2000. [56] J. Lopez, R. Dahab, Improved algorithms for elliptic curve arithmetic in GF(2n), in: Selected Areas in Cryptography, Proc. SAC98, Lecture Notes in Comput. Sci., Vol. 1556, Springer, Berlin, 1998, pp. 201212. [57] H. K. Kwang, N. Christophe; "Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3", SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, 2008. [58] S. Blake-Wilson, A. Menezes, "Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol.", Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, Proceedings, pages: 154-170, 1999. [59] P. Szczechowiak, L.B. Oliveira, M. Scott, M. Collier, and R. Dahab, "NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks", in Proc. EWSN, 2008, pp.305-320. [60] Ngai, E.C.H.; Jiangchuan Liu; Lyu, M.R.; , "On the Intruder Detection for Sinkhole Attack in Wireless Sensor Networks," Communications, 2006. ICC '06. IEEE International Conference on , vol.8, no., pp.3383-3389, June 2006. [61] Hoang Lan Nguyen; Uyen Trang Nguyen; , "Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks," Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006. International Conference on , vol., no., pp. 149, 23-29 April 2006. [62] Pohlig, S.; Hellman, M.; , "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.)," Information Theory, IEEE Transactions on , vol.24, no.1, pp. 106- 110, Jan 1978. [63] An Liu; Peng Ning; , "TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks," Information Processing in Sensor Networks, 2008. IPSN '08. International Conference on , vol., no., pp.245-256, 22-24 April 2008.
12
IJCSNS International Journal of Computer Science and Network Security, Security VOL.11 VOL. No.9, September 2011
[64] Kumar, K.; Begum, J.N.; Sumathy, V.; , "A Novel Approach towards Cost Effective Region Region-Based Group Key Agreement Protocol for Ad Hoc Networks," Computational Intelligence, lligence, Communication Systems and Networks, 2009. CICSYN '09. First International Conference on , vol., no., pp.470-475, 23-25 July 2009. [65] Jing-feng Li; Ya-juan Zhang; Yue-fei fei Zhu; , "A secure elliptic curve communication scheme for the cluster-based cluster ad hoc networks," Wireless, Mobile and Multimedia Networks, 2006 IET International Conference on , vol., no., pp.1-4, 6-9 Nov. 2006. Khamy, S.E.; , "New low complexity key [66] Hamed, A.I.; El-Khamy, exchange and encryption protocols for wireless sensor networks clusters based on Elliptic Curve Cryptography," Radio Science Conference, 2009. NRSC 2009. National , vol., no., pp.1-13, 17-19 March 2009. [67] V. Vijayalakshmi and T.G. Palanivelu, Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography, Journal of Computer Science, Vol. 3, No. 12, 2007, 939-943. [68] Shouyun Song; Junpeng Xu; Shuai Yang; Qing Cong; , "Completely self-organization organization Ad hoc networks key management scheme based on elliptic curve," Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on , vol.6, no., pp.271-274, pp.271 9-11 July 2010. [69] E. Levent, C. Nitu, Elliptic Curve rve Cryptography based Threshold Cryptography (ECC-TC) TC) Implementation for MANETs, IJCSNS, Vol.7, No.4, April 2007. [70] Dahshan, Hisham; Irvine, James; , "A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Based Cryptosystem," Cryptosystem Communication Networks and Services Research Conference (CNSR), 2010 Eighth Annual , vol., no., pp.130-137, 137, 11-14 11 May 2010. [71] Xiaojiang Du; Guizani, M.; Yang Xiao; Hsiao Hsiao-Hwa Chen; , "A routing-driven driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks," Wireless Communications, IEEE Transactions on , vol.8, no.3, pp.1223-1229, March 2009. [72] Pires, W.R., Jr.; de Paula Figueiredo, T.H.; Wong, H.C.; Loureiro, A.A.F.; , "Malicious node detection in wireless sensor networks," Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International , vol., no., pp. 24, 26-30 April 2004. [73] Holohan, E.; Schukat, M.; , "Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks," Network Computing and Applications (NCA), 2010 9th IEEE International Symposium on , vol., no., pp.92-99, 15-17 17 July 2010 2010. [74] C. Zouridaki, B.L. Mark, K. Gaj, R.K. Thomas, "Distributed CA-based based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography", in Proc. EuroPKI, 2004, pp.232-245. hui; , "Research on key [75] Jiang Jian-wei; Liu Jian-hui; management scheme for WSN based on elliptic curve cryptosystem," Networked Digital Technologies, 2009. NDT
'09. First International Conference on , vol., no., pp.536540, 28-31 July 2009. [76] W. Xiong, B. Tang, A Secure and Highly Efficient Key Management Scheme for MANET, AISS: Advances in Information Sciences and Service Sciences, Vol. 3, No. 2, pp. 12-22, 2011.
Jorge Ortz is an Associate Professor at the Department of Computer Systems and Industrial Engineering, National University of Colombia. He earned a Computer Compu Systems Engineer degree, MSc in Statistics Degree, and MSc in Telecommunications Engineering degree from the National University of Colombia in 1995, 1999, and 2005 respectively. respectively He earned a M. Phil. degree from the Javeriana University of Colombia in 2009. 2009 He is currently and PhD (candidate) in Computer Science from the National University of Colombia. Colombia His research work is mainly focused on Ad-Hoc Hoc Networks, Simulations, Artificial Intelligence, Probabilistic bilistic models, model Theoretical Computer Science, Applied Computing among others. He has published more than 50 papers in different journals and international conferences.