Advertisement

Analysis of Wormhole Detection Features in Wireless Sensor Networks

  • Manish PatelEmail author
  • Akshai Aggarwal
  • Nirbhay Chaubey
Conference paper
  • 8 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1122)

Abstract

Security is very important for resource constrained wireless sensor networks due to their fundamental nature. The possible attacks in wireless sensor networks include sinkhole, wormhole, sybil, selective forwarding, blackhole etc. Wormhole is a gateway of many more attacks. To launch the attack is easy, but to detect it is very hard. For launching the attack, it is not required to know the cryptographic material or protocols used in the network. A malicious node attracts the traffic from one location and tunnels to another location and disturbs the whole routing process. In this paper, we have discussed various features for wormhole attack detection in wireless sensor networks.

Keywords

Wireless sensor networks Security Wormhole Attacker 

References

  1. 1.
    Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE (2003)Google Scholar
  2. 2.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRefGoogle Scholar
  3. 3.
    Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 21–32, October 2003Google Scholar
  4. 4.
    Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: ACM, WiSec 2009, Zurich, Switzerland, 16–18 March 2009Google Scholar
  5. 5.
    Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)CrossRefGoogle Scholar
  6. 6.
    Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings INFOCOM, pp. 107–115 (2007)Google Scholar
  7. 7.
    Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 (2009)CrossRefGoogle Scholar
  8. 8.
    Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor networks with statistical analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010)Google Scholar
  9. 9.
    Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing, p. 6 (2006)Google Scholar
  10. 10.
    Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–593 (2013)CrossRefGoogle Scholar
  11. 11.
    Lai, G.H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016)CrossRefGoogle Scholar
  12. 12.
    Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a wsn under wormhole attack. In: ACM, MSWiM 2007, Chaina, Greece, 22–26 October 2007Google Scholar
  13. 13.
    Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M.K., Li, X., Wang, X.: Geographic wormhole detection in wireless sensor networks. J. PLOS ONE. 10(1) 2015.  https://doi.org/10.1371/journal.pone.0115324CrossRefGoogle Scholar
  14. 14.
    Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331–340, September 2007Google Scholar
  15. 15.
    Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004)Google Scholar
  16. 16.
    Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 13 (2016). Hindawi Publishing Corporation, Article ID 8354930Google Scholar
  17. 17.
    Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. J. Ad Hoc Netw. 7(6), 1051–1063 (2008)CrossRefGoogle Scholar
  18. 18.
    Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009)Google Scholar
  19. 19.
    Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(356382), 16 (2015). Article ID 356382Google Scholar
  20. 20.
    Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise–tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006)CrossRefGoogle Scholar
  21. 21.
    Dong, D., Liu, Y., Li, X. Y., Liao, X., Li, M.: Topological detection on wormholes in wireless ad hoc and sensor networks. In: 17th IEEE International Conference on Network Protocols, pp. 314–323 (2009)Google Scholar
  22. 22.
    Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: ACM, MobiHoc 2011, Paris, France 16–20 May 2011Google Scholar
  23. 23.
    Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer (2005)Google Scholar
  24. 24.
    Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe 2004, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004)Google Scholar
  25. 25.
    Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 9 (2012). Article ID 145702Google Scholar
  26. 26.
    Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016, 15 (2016). Article ID 3405264Google Scholar
  27. 27.
    Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems, pp. 1–6 (2014)Google Scholar
  28. 28.
    Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13, 27–59 (2007)CrossRefGoogle Scholar
  29. 29.
    Matam, R., Tripathy, S.: WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 180 (2013). SpringerCrossRefGoogle Scholar
  30. 30.
    Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., Economides, A.: EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, pp. 103–109 (2016)Google Scholar
  31. 31.
    Chen, H., Chen, W., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014(1), 10 (2014)Google Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Manish Patel
    • 1
    Email author
  • Akshai Aggarwal
    • 2
  • Nirbhay Chaubey
    • 2
  1. 1.Smt. S R Patel Engineering CollegeUnjhaIndia
  2. 2.Gujarat Technological UniversityAhmedabadIndia

Personalised recommendations