INFORMATION CHANGE THE WORLD

International Journal of Computer Network and Information Security(IJCNIS)

ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online)

Published By: MECS Press

IJCNIS Vol.11, No.5, May. 2019

Distributed Wormhole Attack Mitigation Technique in WSNs

Full Text (PDF, 774KB), PP.20-27


Views:3   Downloads:0

Author(s)

Sharada Kori, Krishnamurthy G N, Nandini Sidnal

Index Terms

WSN;Security;Wormhole Attack;Wormhole attack mitigation

Abstract

Sensing element Networks area unit gaining a lot of attention as a result of applications like sensible cities(traffic congestion, sensible parking, sensible lighting), sensible setting (forest hearth detection, air pollution) security and emergencies (Radiation levels, Explosive and dangerous Gases, Military applications) to call a couple of. The important facet of those observation and chase applications area unit security and sensing element location. The Wireless sensing element Networks may be thought to be associate degree freelance theme for accomplishing data-intensive chores like atmosphere (habitat) perceptive, data congregation, earthquake perceptive, parcel intelligence operation, etc. and any communication to the appliance. Wormhole attack could be a severe threat to the safety of the network. Because it could be a passive attack, it's terribly difficult to notice Wormhole attack. The most stress of this analysis work is to mitigate the wormhole attack. During this paper, we have a tendency to address the wormhole attack by proposing a trust-based wormhole attack mitigation technique. Our projected system is easy with no further hardware demand and no tight clock synchronization.

Cite This Paper

Sharada Kori, Krishnamurthy G N, Nandini Sidnal,"Distributed Wormhole Attack Mitigation Technique in WSNs", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.5, pp.20-27, 2019.DOI: 10.5815/ijcnis.2019.05.03

Reference

[1]P. B. Hari and S. N. Singh, “Security issues in Wireless Sensor Networks: Current research and challenges,” 2016 Int. Conf. Adv. Comput. Commun. Autom., pp. 1–6, 2016.

[2]P. Tague and R. Poovendran, “Modeling Node Capture Attacks in Wireless Sensor Networks Invited Paper,” Electr. Eng., pp. 1221–1224, 2008.

[3]C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Proc. First IEEE Int. Work. Sens. Netw. Protoc. Appl. 2003., pp. 113–127, 2003.

[4]Z. Tanveer and Z. Albert. Security issues in wireless sensor networks, ICSNC'06: Proceedings of the International Conference on Systems and Networks Communication, Washington, DC, USA, IEEE Computer Society, 2006, 40. 

[5]J. Rehana, “Security of Wireless Sensor Network,” p. 10, 2009.

[6]J. Walters and Z. Liang, “Wireless sensor network security: A survey,” Secur. Distrib. …, pp. 1–50, 2007.

[7]J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Networks, vol. 52, no. 12, pp. 2292–2330, 2008.

[8]R. A. Shaikh, H. Jameel, B. J. d’Auriol, H. Lee, S. Lee, and Y. J. Song, “Achieving network level privacy in wireless sensor networks,” Sensors, vol. 10, no. 3, pp. 1447–1472, 2010.

[9]J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, “Dealing with Sinkhole Attacks in Wireless Sensor Networks,” ASTL Sectech, vol. 29, no. SecTech, pp. 7–12, 2013.

[10]Majid Meghdadi, Suat Ozdemir, and Inan Güler, ―A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks,‖ IETE technical review, VOL 28, ISSUE 2, 2011.

[11]P. Niranjan, M. Shrivastava, and R. Singh Khainwar, “Enhancement of Routes Performance in MANET Avoiding Tunneling Attack,” Int. J. Comput. Appl., vol. 42, no. 12, pp. 28–32, 2012.

[12]S. Ji, T. Chen, S. Zhong, and S. Kak, “DAWN: Defending against wormhole attacks in wireless network coding systems,” INFOCOM, 2014 Proc. IEEE, pp. 664–672, 2014.

[13]D. Dong, M. Li, Y. Liu, X.-Y. Li, and X. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks,” IEEE/ACM Trans. Netw., vol. 19, no. 6, pp. 1787–1796, 2011.

[14]Z. T. and A. H. Maw., “Wormhole attack detection in wireless sensor networks,” Proc. World Acad. Sci. Eng. Technol. Technol., vol. 46, no. 3, pp. 545–50, 2008.

[15]Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” IEEE INFOCOM 2003. Twenty-second Annu. Jt. Conf. IEEE Comput. Commun. Soc. (IEEE Cat. No.03CH37428), vol. 3, pp. 1976–1986, 2002.

[16]Z. Zhao, B. Wei, X. Dong, L. Yao, and F. Gao, “Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis,” 2010 WASE Int. Conf. Inf. Eng., pp. 251–254, 2010.

[17]W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” Proc. 2004 ACM Work. Wirel. Secur. - WiSe ’04, p. 51, 2004.

[18]I. Khalil, S. Bagchi, and N. B. Shroff, “LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” Proc. Int. Conf. Dependable Syst. Networks, no. August 2015, pp. 612–621, 2005.

[19]R. Z. El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy, “DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks,” no. August 2014, 2005.

[20]L. Buttyán, L. Dóra, and I. Vajda, "Statistical Wormhole Detection in Sensor Networks," Secur. Priv. Ad-hoc Sens. Networks, pp. 128–141, 2005. 

[21]J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “TrueLink: A practical countermeasure to the wormhole attack in wireless networks,” Proc. - Int. Conf. Netw. Protoc. ICNP, pp. 75–84, 2006.

[22]R. Poovendran and L. Lazos, "A graph-theoretic framework for preventing the wormhole attack in wireless ad hoc networks," Wirel. Networks, vol. 13, no. 1, pp. 27–59, 2007. 

[23]S. Madria and J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks,” Ad Hoc Networks, vol. 7, no. 6, pp. 1051–1063, 2009.

[24]Y. Xu, G. Chen, J. Ford, and F. Makedon, “Chapter 14 DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS.”

[25]T. Hayajneh, P. Krishnamurthy, and D. Tipper, “DeWorm: A simple protocol to detect wormhole attacks in wireless ad hoc networks,” NSS 2009 - Netw. Syst. Secur., pp. 73–80, 2009.

[26]Z. Zhao, B. Wei, X. Dong, L. Yao, and F. Gao, “Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis,” 2010 WASE Int. Conf. Inf. Eng., pp. 251–254, 2010.

[27]S. Gupta, S. Kar, and S. Dharmaraja, “WHOP: Wormhole attack detection protocol using hound packet,” 2011 Int. Conf. Innov. Inf. Technol. IIT 2011, pp. 226–231, 2011.

[28]S. K. Dhurandher and I. Woungang, "E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks," 26th Int. Conf. Adv. Inf. Netw. Appl. Work., pp. 472–477, 2012. 

[29]A. Louazani, L. Sekhri, and B. Kechar, “A time Petri net model for wormhole attack detection in wireless sensor networks,” 2013 Int. Conf. Smart Commun. Netw. Technol., pp. 1–6, 2013.

[30]B. Tian, Q. Li, Y. X. Yang, D. Li, and Y. Xin, “A ranging based scheme for detecting the wormhole attack in wireless sensor networks,” J. China Univ. Posts Telecommun., vol. 19, no. SUPPL. 1, pp. 6–10, 2012.

[31]H. M. Choi, S. M. Nam, and T. H. Cho, “A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks *,” vol. 2013, no. March, pp. 33–40, 2013.

[32]G. Wu, X. Chen, L. Yao, Y. Lee, and K. Yim, “An efficient wormhole attack detection method in wireless sensor networks,” Comput. Sci. Inf. Syst., vol. 11, no. 3, pp. 1127–1142, 2014.

[33]N. Agrawal and N. Mishra, “RTT based wormhole detection using NS-3,” Proc. - 2014 6th Int. Conf. Comput. Intell. Commun. Networks, CICN 2014, pp. 861–866, 2014.

[34]J. H. Zheng, H. Y. Qian, and L. Wang, “Defense technology of wormhole attacks based on node connectivity,” Proc. - 2015 IEEE Int. Conf. Smart City, SmartCity 2015, Held Jointly with 8th IEEE Int. Conf. Soc. Comput. Networking, Soc. 2015, 5th IEEE Int. Conf. Sustain. Comput. Communic, pp. 421–425, 2015.

[35]P. Amish and V. B. Vaghela, “Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol,” Procedia Comput. Sci., vol. 79, pp. 700–707, 2016.

[36]D. S. Bhatti, S. Saeed, M. A. Ullah, N. S. Naaz, S. S. R. Rizvi, and S. T. Ali, “SRoWM: Smart Review on Wormhole Mitigation,” Int. J. Comput. Sci. Netw. Secur., vol. 17, no. 12, pp. 178–187, 2017.