Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack

Wireless Sensor Network provides various applications like military, healthcare etc. These types of applications required a certain level of security. WSN is exposed by various types of attacks; wormhole is one of severe attack on WSN. In wormhole attack, an attacker receives packet from one location pass them through the tunnel and release to them another location. We propose an algorithm which defends wormhole attack in WSN called public key encryption and 2Ack based approach. Proposed approach provides security and finds misbehaving nodes in the network.

[1]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[2]  N. Sarma,et al.  SECURITY ISSUES IN WIRELESS SENSOR NETWORK DATA GATHERING PROTOCOLS: A SURVEY , 2010 .

[3]  Rabi N. Mahapatra,et al.  Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[4]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[5]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[6]  Gunhee Lee,et al.  An Approach to Mitigate Wormhole Attack in Wireless Ad Hoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[7]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[8]  Kashyap Patel,et al.  Detection of Wormhole Attack In Wireless Sensor Network , 2013 .

[9]  Ali Modirkhazeni,et al.  Distributed approach to mitigate wormhole attack in wireless sensor networks , 2011, 7th International Conference on Networked Computing.

[10]  Devesh C. Jinwala,et al.  Detection of Wormhole attacks in Wireless Sensor Network , 2011, ARTCom 2011.

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  K. Vijaya Secure 2ACK routing protocol in Mobile Ad Hoc Networks , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.