Dealing with Wormhole Attacks in Wireless Sensor Networks Through Discovering Separate Routes Between Nodes
One of the most common attacks against Wireless Sensor Networks is the wormhole attack. In this attack, the enemy deploys two malicious nodes in two different areas of the network and establishes a high-speed dedicated channel between these two. This will cause the normal nodes in two different areas wrongly think that they are two-hop neighbors. Therefore, this attack will greatly affect the routing algorithms. In this paper, a new distributed algorithm is provided to deal with the wormhole attack. The main idea of the proposed algorithm is to discover separate routes between pairs of two-hop neighboring nodes. The proposed algorithm was implemented and evaluated in terms of true and false detection rate by performing a series of experiments and the results were compared with the base algorithm. The test results showed that the proposed algorithm has desirable efficacy.
Keywords:wireless sensor networks, security, wormhole attack
J. Yick, B. Mukherjee, D. Ghosal, “Wireless sensor network survey”, Computer Νetworks, Vol. 52, No. 12, pp. 2292-2330, 2008 DOI: https://doi.org/10.1016/j.comnet.2008.04.002
A. J. Goldsmith, S. B. Wicker, “Design challenges for energy-constrained ad hoc wireless networks”, IEEE Wireless Communications, Vol. 9, No. 4, pp. 8-27, 2002 DOI: https://doi.org/10.1109/MWC.2002.1028874
I. F. Akyildiz, I. H. Kasimoglu, “Wireless sensor and actor networks: research challenges”, Ad Hoc Networks,Vol. 2, No. 4, pp. 351-367, 2004 DOI: https://doi.org/10.1016/j.adhoc.2004.04.003
K. Sharma, M. K. Ghose, D. Kumar, R. P. K. Singh, V. K. Pandey, “A comparative study of various security approaches used in wireless sensor networks”, International Journal of Advanced Science and Technology, Vol. 17, No. 2, pp. 31-44, 2010
F. R. Kong, C. W. Li, Q. Q. Ding, G. Z. Cui, B. Y. Cui, “WAPN: a distributed wormhole attack detection approach for wireless sensor networks”, Journal of Zhejiang University Science A, Vol. 2, No. 4, pp. 279-289, 2009 DOI: https://doi.org/10.1631/jzus.A0820178
H. Ronghui, M. Guoqing, W. Chunlei, F. Lan, “Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes” World Academy of Science, Engineering and Technology, Vol. 55, No. 31, pp. 10-15, 2009
Y. C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003”, 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, Vol. 3, No. 1, pp. 1976-1986, 2003
J. Wu, H. Chen, W. Lou, Z. Wang, Z. Wang, “Label-based DV-HOP localization against wormhole attacks in wireless sensor networks”, 2010 IEEE Fifth International Conference on Networking, Architecture and Storage (NAS), China, July 15-17, 2010. DOI: https://doi.org/10.1109/NAS.2010.41
L. Buttyán, L. Dóra, I. Vajda, “Statistical wormhole detection in sensor networks”, European Workshop on Security in Ad-hoc and Sensor Networks, pp. 128-141, 2005 DOI: https://doi.org/10.1007/11601494_11
H. Ronghui, M. Guoqing, F. Lan, K. Chunguang, L. Li, “WRL: a wormhole-resistent localization scheme based on DV-hop for wireless sensor networks”, 14th WSEAS International Conference on Computers, Corfu Island, Greece July 23-25, 2010
G. H. Lai, C. S. Ouyang, C. M. Chen, “A Group-Based Deployment for Wormhole Prevention in Sensor Networks”, Journal of Information Science & Engineering, Vol. 27, No. 1, pp. 79-93, 2011
D. B. Roy, R. Chaki, N. Chaki, “A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks”, arXiv preprint arXiv, 2010.
R. Maheshwari, J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications, Spain, May 6-12, 2007 DOI: https://doi.org/10.1109/INFCOM.2007.21
D. Dong, M. Li, Y. Liu, X. Liao, “Connectivity-Based Wormhole Detection in Ubiquitous Sensor Networks”, Journal of Information Science & Engineering, Vol. 27, No. 1, pp. 65-78, 2011
T. Giannetsos, T. Dimitriou, N. P. Prasad, “State of the art on defenses against wormhole attacks in wireless sensor networks”, IEEE 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless VITAE 2009, Denmark, May 17-20, 2009 DOI: https://doi.org/10.1109/WIRELESSVITAE.2009.5172466
I. Krontiris, T. Giannetsos, T. Dimitriou, “LIDeA: a distributed lightweight intrusion detection architecture for sensor networks”, 4th International Conference on Security and Privacy in Communication Networks ACM, Turkey, September 22 - 25, 2008 DOI: https://doi.org/10.1145/1460877.1460903
S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, pp. 1051-1063, 2009 DOI: https://doi.org/10.1016/j.adhoc.2008.09.005
W. Znaidi, M. Minier, J. P. Babau, “Detecting wormhole attacks in wireless networks using local neighborhood information”, IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, France, September 15-18, 2008 DOI: https://doi.org/10.1109/PIMRC.2008.4699583
How to Cite
MetricsAbstract Views: 515
PDF Downloads: 182
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.