Security Techniques for Wormhole Attack in Wireless Sensor Networks

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The wireless sensor network has group of sensors which can sense the data and route this data to base station. As there is no physical connection between sensor and base station the important data can be routed without wires. The broadcast nature of wireless sensor network makes it prone to security threat to the valuable data. The attacker node can detect the data by creating their own data aggregation and routing mechanism .The number of attacks can be possible on the network layer. Out of these attacks wormhole is one of the major attack which can change the routing method of the whole wireless sensor network. In this attack,the attacker node can control the packet transmission of whole network and route it to the tunnel of nodes. The major drawback of this attack is to increase the packet drop and disturbing the routing mechanism. A number of security techniques are developed by the researcher to reduce the packet drop ratio and secure the routing mechanism of the network. Out of all thesetechniquesfew related to packet drop ratio are discussed in this paper. TheLightweight countermeasure for the wormhole attack (LITEWORP) based on Dynamic Source routing (DSR) protocol security technique,Delay Per Hop Indication (Delphi) based on AODV(Avoidance Routing Protocol) Protocol security technique and MOBIWORP based on DSRprotocol security technique reduce the packet loss percentage 40%,43% and 35% respectively. 

     

     


  • Keywords


    Attacker node, Detection techniques, Security,Wormhole attack, Wireless Sensor Networks

  • References


      [1] P. Maidamwar and N. Chavhan, “A Survey on Security Issues to Detect Wormhole Attack in Wireless Sensor Network,” Int. J. Ad hoc Netw. Syst., vol. 2, no. 4, pp. 37–50, 2012.

      [2] J. H. Zheng, H. Y. Qian, and L. Wang, “Defense technology of wormhole attacks based on node connectivity,” Proc. - 2015 IEEE Int. Conf. Smart City, SmartCity 2015, Held Jointly with 8th IEEE Int. Conf. Soc. Comput. Networking, Soc. 2015, 5th IEEE Int. Conf. Sustain. Comput. Communic, pp. 421–425, 2015.

      [3] M. Seth, “Detection of Wormhole Attacks in Wireless Sensor Networks Detection of WormHole Attacks in Wireless Sensor Networks by,” vol. 3, pp. 21–25, 2012.

      [4] C. Paper, W. Znaidi, and S. Appliqu, “Detecting wormhole attacks in wireless networks using local neighborhood information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information,” no. December 2015, 2008.

      [5] Z. Rui and Z. Yanchao, “Wormhole-Resilient Secure Neighbor Discovery in Underwater Acoustic Networks BT - INFOCOM, 2010 Proceedings IEEE,” pp. 1–9, 2010.

      [6] J. Harbin, P. Mitchell, and D. Pearce, “Wireless sensor network wormhole avoidance using disturbance-based routing schemes,” Proc. 2009 6th Int. Symp. Wirel. Commun. Syst. ISWCS’09, pp. 76–80, 2009.

      [7] X. Lu and Z. Yonghua, “Modeling the wormhole attack in underwater sensor network,” 2012 Int. Conf. Wirel. Commun. Netw. Mob. Comput. WiCOM 2012, pp. 5–8, 2012.

      [8] I. Khalil, S. Bagchi, and N. B. Shroff, “LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks,” Comput. Networks, vol. 51, no. 13, pp. 3750–3772, 2007.

      [9] M. Y. Su, “WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,” Comput. Secur., vol. 29, no. 2, pp. 208–224, 2010.

      [10] Hon Sun Chiu and King-Shan Lui, “DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks,” 2006 1st Int. Symp. Wirel. Pervasive Comput., pp. 1–6, 2006.

      [11] I. Khalil, S. Bagchi, N. B. Shroff, C. Engineering, N. Avenue, and W. Lafayette, “MOBI W ORP : Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks,” pp. 1–12.

      [12] J. Wu, H. Chen, W. Lou, Z. Wang, and Z. Wang, “Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks,” 2010 IEEE Fifth Int. Conf. Networking, Archit. Storage, pp. 79–88, 2010.

      [13] Q. Li and Q. Zeng, “Efficiently detecting wormhole attacks in sensor networks by information potential,” 3rd Int. Conf. Commun. Netw. China, ChinaCom 2008, pp. 692–698, 2008.

      [14] T. N. D. Pham and C. K. Yeo, “Statistical wormhole detection and localization in delay tolerant networks,” 2014 IEEE 11th Consum. Commun. Netw. Conf. CCNC 2014, pp. 380–385, 2014.

      [15] B. Yu and T. Li, “Study of wormhole attack detecting based on local connectivity information in wireless sensor networks,” 2011 Int. Conf. Comput. Sci. Serv. Syst. CSSS 2011 - Proc., pp. 3585–3588, 2011.

      [16] I. Khalil, S. Bagchi, and N. B. Shroff, “LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks,” Proc. Int. Conf. Dependable Syst. Networks, pp. 612–621, 2005.

      [17] M. Čagalj, S. Čapkun, and J. P. Hubaux, “Wormhole-based antijamming techniques in sensor networks,” IEEE Trans. Mob. Comput., vol. 6, no. 1, pp. 100–114, 2007.


 

View

Download

Article ID: 11884
 
DOI: 10.14419/ijet.v7i2.23.11884




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.