Detection and Mitigation from Wormhole Based Protocol Deviation Depends on Neighbor Discovery Approach In WSN

  • Authors

    • Sandip Mandal
    • Rama Sushil
    https://doi.org/10.14419/ijet.v7i4.17.21804

    Received date: November 27, 2018

    Accepted date: November 27, 2018

    Published date: November 27, 2018

  • Wireless Sensor Networks, Wormhole, Denial of Service, Routing Attacks, In-Band Wormhole.
  • Abstract

    Wireless Sensor Networks (WSN) are composed of a large ,yet limited number of sensing devices called sensors, communicating over a wireless media. Wireless sensor networks find prospective applications in fields like environmental monitoring, healthcare, battlefield surveillance, and homeland security. A much broader spectrum of future applications is likely to follow. Deployment of WSN in hostile environments, unattended operation, openness of communication and resource constraints e.g. limited memory, energy and computational capabilities exposes WSN to a number of security attacks. The resource constrained nature of WSN makes conventional security mechanisms incongruous to apply. In this paper, an In-Band wormhole attack on a wireless sensor network is studied, in which an adversary creates a link between two regions of the network by using colluding network nodes. The impact of an In-Band wormhole attack on data transmission and energy consumption in the network is studied and a reactive recovery mechanism to detect and mitigate the Denial of Service effect caused due to it is presented.

  • References

    1. Prasannajit B, Anupama, Vindhykumari, Subhashini and Vinitha , “An Approach Towards Detection Of Wormhole Attack in Sensor Networks,” Integrated Intelligent Computing (ICIIC) First Interna-tional Conference on,IEEE , E-ISBN 978-0-7695-4152-5 pp 283-289 , 2010
    2. Karlof & Wanger, “Secure Routing in Wireless Sensor Network: Attacks and Countermeasures,” First IEEE International Workshop on Sensor Network Protocols and Applications,SNPA, pp 113-127 2003
    3. Khalil, Bagchi, & Shroff, “LiteWorp:Detection And Isolation Of The Wormhole Attack in Static Multihop Wireless Networks ,” In-ternational Journal Of Computer And Telecommunications Net-working,vol. 51(13),pp 3750-3772
    4. Y. C. Hu, A. Perrig and D. B. Johnson, “Packet Leashes: A De-fense against Wormhole Attacks in Wireless Networks, “ 22nd An-nual Joint Conferenceof the IEEE Computer and Communications Societies(INFOCOM), pp. 1976-1986 ,2003
    5. Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee and Heejo Lee,”TTM: An Efficient Mechanism to Detect Wormhole At-tacks in Wireless Ad-hoc Networks, “4th IEEE conference on Con-sumer Communications and Networking Conference, pp. 593 – 598
    6. J. Zhen and S. Srinivas, “Preventing replay attacks for secure rout-ing in ad hoc networks, “Proceedings of 2nd Ad Hoc Networks & Wireless (ADHOCNOW'03), pp. 140—150,2003
    7. W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks, “WiSe, Proceedings ofthe 2004 ACM workshop on Wire-less security. ACM Press, pp. 51−60 , 2004
    8. S. Özdemir, M. Meghdadi, and Ý. Güler, “A time andtrust based wormhole detection algorithm for wirelesssensor networks,” 3rd In-formation Security andCryptology Conference (ISC′08), pp. 139−4, 2008
    9. Ali Modirkhazeni, Saeedeh Aghamahmoodi, ArsalanModirkha-zeni,NaghmehNiknejad,”Distributed
    10. Approach to Mitigate Wormhole Attack in WirelessSensor Net-works”IEEE,pp 122-128 , 2011
    11. Phillip Lee,Andrew Clark,Linda Bushnell1,and RadhaPoovendran, “A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems ,”IEEE Transactions onAu-tomatic Control, Special Issue On Control of Cyber Physical Sys-tems 2013
    12. Yih-Chun Hu,Adrian Perrig and David B.johnson. Packet leashes: A defense aginst wormhole attacks in wireless networks. In Pro-ceedings of IEEE Infocom 2003, April 2003.
    13. Ari Juels and John Brainard. Client puzzles : A cryptographic de-fence aginst connection depletion attacks.In S.Kent,editor,Proceedings of NDSS ’99 (Networks and Distributed Security systems), pages 151.165,1999
    14. Tuomas Aura,Pekka Nikander,and Jussipekka Leiwo. DOS-resistant authentication with client puzzles.Lecture Notes in Computer Sci-ence, 2133:170.177, 2001.
    15. Jiang changyong, Zhang jianming. “The selective forwarding at-tacks detection in WSNs”. Computer Engineering, 2009, 35(21):140-143
    16. Bo Yu and Bin Xiao. Detecting selective forwarding attacks in wireless sensor networks. In Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International, page 8 pp., 2006.
    17. Sophia Kaplantzis , Alistair Shilton , Nallasamy Mani , Y. Ahmet S¸ekercio glu ,” Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machines”, intelligent sen-sors, sensor networks and information ,3rd international confer-ence ,pg 335 – 340,ISSNIP 2007 .
    18. Jeremy Brown and Xiaojiang Du. Detection of selective forwarding attacks in heterogeneous sensor networks. In ICC, pages 1583–1587, 2008
    19. Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, and Wang Liangmin. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. pages 226 –232, oct. 2009
    20. Zurina Mohd Hanapi, Mahmod Ismail and Kasmiran Jumari, Priori-ty and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Network”, American Jour-nal of Engineering and Applied Sciences 2 (2): 494- 500, 2009
    21. Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee and Young-Jae Song,” Achieving Network Level Privacy in Wireless Sensor Networks “,Sensors 2010, 10, 1447-1472; doi:10.3390/s100301447
    22. Guorui Li, Xiangdong Liu, and Cuirong Wang “A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wire-less Sensor Networks”
  • Downloads

  • How to Cite

    Mandal, S., & Sushil, R. (2018). Detection and Mitigation from Wormhole Based Protocol Deviation Depends on Neighbor Discovery Approach In WSN. International Journal of Engineering and Technology, 7(4.17), 62-65. https://doi.org/10.14419/ijet.v7i4.17.21804