Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes

Authors

  • F. Rezaei Department of Computer Engineering, College of Technical and Engineering, Kermanshah Branch, Islamic Azad University, Kermanshah, Iran
  • A. Zahedi Department of Electrical Engineering, Kermanshah University of Technology, Kermanshah, Iran
Volume: 7 | Issue: 4 | Pages: 1771-1774 | August 2017 | https://doi.org/10.48084/etasr.1118

Abstract

One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this attack, the enemy deploys two malicious nodes in two different areas of the network and establishes a high-speed dedicated channel between these two. This will cause the normal nodes in two different areas wrongly think that they are two-hop neighbors. Therefore, this attack will greatly affect the routing algorithms. In this paper, a new distributed algorithm is provided to deal with the wormhole attack. The main idea of the proposed algorithm is to discover separate routes between pairs of two-hop neighboring nodes. The proposed algorithm was implemented and evaluated in terms of true and false detection rate by performing a series of experiments and the results were compared with the base algorithm. The test results showed that the proposed algorithm has desirable efficacy.

Keywords:

wireless sensor networks, security, wormhole attack

Downloads

Download data is not yet available.

References

J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Computer Νetworks, Vol. 52, No. 12, pp. 2292-2330, 2008 DOI: https://doi.org/10.1016/j.comnet.2008.04.002

A. J. Goldsmith, S. B. Wicker, “Design challenges for energy-constrained ad hoc wireless networks”, IEEE Wireless Communications, Vol. 9, No. 4, pp. 8-27, 2002 DOI: https://doi.org/10.1109/MWC.2002.1028874

I. F. Akyildiz, I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges”, Ad Hoc Networks,Vol. 2, No. 4, pp. 351-367, 2004 DOI: https://doi.org/10.1016/j.adhoc.2004.04.003

K. Sharma, M. K. Ghose, D. Kumar, R. P. K. Singh, V. K. Pandey, “A comparative study of various security approaches used in wireless sensor networks”, International Journal of Advanced Science and Technology, Vol. 17, No. 2, pp. 31-44, 2010

F. R. Kong, C. W. Li, Q. Q. Ding, G. Z. Cui, B. Y. Cui, “WAPN: a distributed wormhole attack detection approach for wireless sensor networks”, Journal of Zhejiang University Science A, Vol. 2, No. 4, pp. 279-289, 2009 DOI: https://doi.org/10.1631/jzus.A0820178

H. Ronghui, M. Guoqing, W. Chunlei, F. Lan, “Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes” World Academy of Science, Engineering and Technology, Vol. 55, No. 31, pp. 10-15, 2009

Y. C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003”, 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Vol. 3, No. 1, pp. 1976-1986, 2003

J. Wu, H. Chen, W. Lou, Z. Wang, Z. Wang, “Label-based DV-HOP localization against wormhole attacks in wireless sensor networks”, 2010 IEEE Fifth International Conference on Networking, Architecture and Storage (NAS), China, July 15-17, 2010. DOI: https://doi.org/10.1109/NAS.2010.41

L. Buttyán, L. Dóra, I. Vajda, “Statistical wormhole detection in sensor networks”, European Workshop on Security in Ad-hoc and Sensor Networks, pp. 128-141, 2005 DOI: https://doi.org/10.1007/11601494_11

H. Ronghui, M. Guoqing, F. Lan, K. Chunguang, L. Li, “WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks”, 14th WSEAS International Conference on Computers, Corfu Island, Greece July 23-25, 2010

G. H. Lai, C. S. Ouyang, C. M. Chen, “A Group-Based Deployment for Wormhole Prevention in Sensor Networks”, Journal of Information Science & Engineering, Vol. 27, No. 1, pp. 79-93, 2011

D. B. Roy, R. Chaki, N. Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks”, arXiv preprint arXiv, 2010.

R. Maheshwari, J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Spain, May 6-12, 2007 DOI: https://doi.org/10.1109/INFCOM.2007.21

D. Dong, M. Li, Y. Liu, X. Liao, “Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks”, Journal of Information Science & Engineering, Vol. 27, No. 1, pp. 65-78, 2011

T. Giannetsos, T. Dimitriou, N. P. Prasad, “State of the art on defenses against wormhole attacks in wireless sensor networks”, IEEE 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless VITAE 2009, Denmark, May 17-20, 2009 DOI: https://doi.org/10.1109/WIRELESSVITAE.2009.5172466

I. Krontiris, T. Giannetsos, T. Dimitriou, “LIDeA: a distributed lightweight intrusion detection architecture for sensor networks”, 4th International Conference on Security and Privacy in Communication Networks ACM, Turkey, September 22 - 25, 2008 DOI: https://doi.org/10.1145/1460877.1460903

S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, pp. 1051-1063, 2009 DOI: https://doi.org/10.1016/j.adhoc.2008.09.005

W. Znaidi, M. Minier, J. P. Babau, “Detecting wormhole attacks in wireless networks using local neighborhood information”, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, France, September 15-18, 2008 DOI: https://doi.org/10.1109/PIMRC.2008.4699583

Downloads

How to Cite

[1]
F. Rezaei and A. Zahedi, “Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes”, Eng. Technol. Appl. Sci. Res., vol. 7, no. 4, pp. 1771–1774, Aug. 2017.

Metrics

Abstract Views: 675
PDF Downloads: 342

Metrics Information

Most read articles by the same author(s)