Advertisement

Security Enhancement Approach in WSN to Recovering from Various Wormhole-Based DDoS Attacks

  • Sandip MandalEmail author
  • Rama Sushil
Conference paper

Abstract

In wireless sensor network basically, wormhole types of attacks are quite challenging to search because the comprised member nodes again sending valid data messages into the transmission channel of WSN. Maximum WSN nodes are sometimes added very conventional security techniques to protect from invalid nodes from pushing wrong data packets to the communication channel. So, in various cases wormhole attacks, the sent data messages filtered through security checks. Wormhole types of security breaches are comparatively smooth to launch but comparatively tough to detection ground that’s why wormhole recovering and detection is a wide searching scope in WSN. Maximum protocols to securing from wormhole use locating software, flip-based timer, or directional devices. In this research document, authentic wormhole attack tracking mechanisms are established. The importance of wormhole attack on packet transmission technique and energy or resource balancing in a network is gathered and proper recovering methods presented to check and solution for the DDoS (Distributed Denial of Services Attack) effect due to wormhole problem.

Keywords

WSN DTT Data rate DDoS CVT Security Wormhole attack Base station Delay 

References

  1. 1.
    H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. “Security in mobile ad-hoc networks: Challenges and solution,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38–47, Feb. 2004.Google Scholar
  2. 2.
    M. Meghdadi, S. Özdemir, and Ý. Güler. “Security wireless sensor networks: Problems and solutions,” (manuscript in Turkish), Journal of Informatica Technologies, Gazi University, Ankara, Turkey, vol. 1, no. 1, pp. 35–42, Jan. 2008.Google Scholar
  3. 3.
    F. Hu, D. Dong, and Y. Xiao. “Attacks and countermeasures in multi-hop cognitive radio networks,” International Journal of Security and Networks, vol. 4, no. 4, pp. 263–71, 2009.CrossRefGoogle Scholar
  4. 4.
    Najma Farooq, Irwa Zahoor, Sandip Mandal,” Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks” Vol.4, No.3 (June 2014) International Journal of Current Engineering and Technology E-ISSN 2277 – 4106, P-ISSN 2347-5161.Google Scholar
  5. 5.
    V. Karyotis, S. Papavassiliou, M. Grammatikou, and V. Maglaris. “A novel framework for mobile attack strategy modeling and vulnerability analysis in wireless ad-hoc networks,” International Journal of Security and Networks, vol. 1, no. 3/4, pp. 255–65, 2006.CrossRefGoogle Scholar
  6. 6.
    R. Poovendran and L. Lazos. “A graph-theoretic framework for preventing the wormhole attack in wireless ad-hoc networks,” Wireless Networks, vol. 13, no. 1, pp. 27–59, Jan. 2007.CrossRefGoogle Scholar
  7. 7.
    G.C. Dalton II, K. S. Edge, R. F. Mills, and R.A. Raines. “Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees,” International Journal of Security and Networks, vol. 5, no. 2/3, pp. 87–95, 2010.Google Scholar
  8. 8.
    T. Haenselmann. Sensor networks. Published under the Free Documentation License (GND FDL). Available from: http://www.pi4.informatik.uni-mannheim.de/~haensel/sn_book/ [last cited in 2006].
  9. 9.
    K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng. “Attacks and countermeasures in sensor networks: A survey,” The George Washington University Technical Report GWU-CS-TR-010-05, 2005.Google Scholar
  10. 10.
    Y.C. Hu, A. Perrig, and D.B. Johnson. “Packet leashes: A defense against wormhole attacks in wireless ad-hoc networks,” Proceedings of 22nd IEEE INFOCOM, pp. 1976–86, Apr. 2003.Google Scholar
  11. 11.
    R. Ramanathan. “On the performance of ad hoc networks with beamforming antennas,” MobiHoc′01: Proceedings of the 2nd ACM international symposium on Mobile ad-hoc networking and computing: ACM Press, pp. 95–105, 2001.Google Scholar
  12. 12.
    A.A. Pirzada and C.S. McDonald. “Circumventing sinkholes and wormholes in ad-hoc wireless networks,” Proceedings of International Workshop on Wireless Ad-hoc Networks, London, England, Kings College, London, 2005.Google Scholar
  13. 13.
    J. Zhen and S. Srinivas. “Preventing replay attacks for secure routing in ad-hoc networks,” Proc. of 2nd Ad Hoc Networks and Wireless, pp. 140–50, 2003.Google Scholar
  14. 14.
    A. Akyildiz, I.F. Su, W. Sankarasubramaniam, and E. Cayirci. “A survey on sensor networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, Aug. 2002.Google Scholar
  15. 15.
    S. Hadim and S.N. Mohamed. “Middleware challenges and approaches for wireless sensor networks,” IEEE Distributed Systems, vol. 7, no. 3, pp. 1–23, Mar. 2006.Google Scholar
  16. 16.
    H. Mohammadi, E.N. Oskoee, M. Afsharchi, N. Yazdani, and M. Sahimi. “A percolation model of mobile ad-hoc networks,” International Journal of Modern Physics C (IJMPC), vol. 20, no. 12, pp. 1871–902, 2009.zbMATHCrossRefGoogle Scholar
  17. 17.
    Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. “A Survey of key management schemes in wireless sensor networks,” Computer Communications Journal, Special issue on security on wireless ad-hoc and sensor networks, vol. 30, no. 11–12, pp. 2314–41, Sep. 2007.Google Scholar
  18. 18.
    M. Hutter, T. Plos, and M. Feldhofer. “On the security of RFID devices against implementation attacks,” International Journal of Security and Networks, vol. 5, no. 2/3, pp. 106–18, 2010.CrossRefGoogle Scholar
  19. 19.
    Y.C. Hu, A. Perrig, and D.B. Johnson, “Wormhole detection in wireless ad-hoc networks,” Department of Computer Science, Rice University, Technical Report TR01-384, Jun. 2002.Google Scholar
  20. 20.
    L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L.W. Chang. “Preventing wormhole attacks on wireless ad-hoc networks: A graph-theoretic approach,” in Preceding of Wireless Communications and Networking Conference, vol. 2, pp. 1193–9, Mar. 2005.Google Scholar
  21. 21.
    Najma Farooq, Irwa Zahoor, Sandip Mandal, “Recovering from In-Band Wormhole Based Denial of Service in Wireless Sensor Networks” in International Journal of Current Engineering and Technology, Vol 4, PP. 1604–1607, 2014.Google Scholar
  22. 22.
    R.R. Choudhury, X. Yang, N.H. Vaidya, and R. Ramanathan. “Using directional antennas for medium access control in ad-hoc networks,” MobiCom′02: Proceedings of the 8th annual international conference on Mobile computing and networking, pp. 59–70, 2002.Google Scholar
  23. 23.
    S. Yi, Y. Pei, and S. Kalyanaraman. “On the capacity improvement of ad-hoc wireless networks using directional antennas,” MobiHoc 2003, Proceedings of the 4th ACM international symposium on Mobile ad-hoc networking and computing. New York, NY, USA: ACM Press; pp. 108–16, 2003.Google Scholar
  24. 24.
    M. Takai, J. Martin, R. Bagrodia, and A. Ren. “Directional virtual carrier sensing for directional antennas in mobile ad-hoc networks,” MobiHoc′02, Proceedings of the 3rd ACM international symposium on Mobile ad- hoc networking and computing, pp. 183–93, 2002.Google Scholar
  25. 25.
    S. Brands and D. Chaum. “Distance-bounding protocols,” In Theory and Application of Cryptographic Techniques, pp. 344–59, 1993.Google Scholar
  26. 26.
    W. Wang and B. Bhargava. “Visualization of wormholes in sensor networks,” WiSe′04, Proceedings of the 2004 ACM workshop on Wireless security. ACM Press, pp. 51–60, 2004.Google Scholar
  27. 27.
    S. Özdemir, M. Meghdadi, and Ý. Güler. “A time and trust based wormhole detection algorithm for wireless sensor networks,” (manuscript in Turkish), in 3rd Information Security and Cryptology Conference (ISC′08), pp. 139–4, 2008.Google Scholar
  28. 28.
    H. Chen, W. Lou, X. Sun, and Z. Wang. “A secure localization approach against wormhole attacks using distance consistency,” EURASIP Journal on Wireless Communication and Networking- Special Issue on Wireless Network Algorithms, Systems, and Applications, pp. 22–32, 2010.Google Scholar
  29. 29.
    H. Chen, W. Lou, and Z. Wang. “Conflicting-set-based wormhole attack resistant localization in wireless sensor networks,” Book Chapter Lecture Notes in Computer Science – Ubiquitous Intelligence and Computing, vol. 5585/2009, pp. 296—309, 2009.Google Scholar
  30. 30.
    L. Lazos and R. Poovendran, “Serloc: Secure range-independent localization for wireless sensor networks,” Proceedings of the ACM Workshop on Wireless Security, pp. 21–30, Oct. 2004.Google Scholar
  31. 31.
    R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.P. Hubaux. “A practical secure neighbor verification protocol for wireless sensor networks,” ACM WiSec, 2009.Google Scholar
  32. 32.
    I. Khalil, S. Bagchi, and N.B. Shroff. “MOBIWORP: Mitigation of the wormhole attack in mobile multi-hop wireless networks,” Elsevier Ad Hoc Networks, vol. 6, no. 3, pp. 344–62, 2008.CrossRefGoogle Scholar
  33. 33.
    P. Papadimitratos, M. Poturalski, P. Schaller, P. Lafourcade, D. Basin, S. Capkun, and J.P. Hubaux. “Secure neighborhood discovery: A fundamental element for mobile ad-hoc networking,” IEEE Communications Magazine, Feb. 2008.Google Scholar
  34. 34.
    M. Poturalski, P. Papadimitratos, and J.P. Hubaux. “Secure neighbor discovery in wireless networks: Formal investigation of possibility,” ACM ASIACCS2008, pp. 189–200, 2008.Google Scholar
  35. 35.
    Y.C. Hu, A. Perrig, and D.B. Johnson. “Wormhole attacks in wireless networks,” IEEE Journal on Selected Areas of Communications, vol. 24, no. 2, pp. 370–80, 2006.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Information TechnologyDIT University DehradunDehradunIndia

Personalised recommendations