A time Petri net model for wormhole attack detection in wireless sensor networks

The main role of wireless sensor networks (WSN) is to collect sensor environmental data from monitored area. Due to faults or malicious nodes, sensor data collected or reported might be wrong. Hence it is important to detect the presence of wrong sensor readings and misleading reports [18]. In this paper, we present a formal model using Time Petri Net to formally evaluate a proposed solution for detecting wormhole attack in CL-MAC, a cross-layer MAC protocol developed at MAC layer for energy efficient and low latency in WSN [3] [7]. Lunching wormhole attack in CL-MAC can cause the protocol invalid in some scenarios. Wormhole attack in CL-MAC is discussed, and a formal approach based on Time Petri Net (TPN) to detect wormhole attack is presented. TiNA (Time Net Analyzer) TPN tool is used to highlight the formal properties of the proposed solution. The obtained analytical results show that the secured version of CL-MAC can effectively detect and avoid wormhole attack, and make more sensor nodes perform a valid behavior.

[1]  Abolfazl Falahati,et al.  A Fault-Tolerant Cooperative Spectrum Sensing Algorithm over Cognitive Radio Network Based on Wireless Sensor Network , 2011, Wirel. Sens. Netw..

[2]  Philip Meir Merlin,et al.  A study of the recoverability of computing systems. , 1974 .

[3]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[4]  F. Vernadat,et al.  The tool TINA – Construction of abstract state spaces for petri nets and time petri nets , 2004 .

[5]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Bernard Berthomieu,et al.  An Enumerative Approach for Analyzing Time Petri Nets , 1983, IFIP Congress.

[7]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[8]  Peter Kulchyski and , 2015 .

[9]  Hong Liang,et al.  Defending against wormhole attack in OLSR , 2006 .

[10]  Panu Hämäläinen,et al.  Security in Wireless Sensor Networks: Considerations and Experiments , 2006, SAMOS.

[11]  Mohit Saxena,et al.  SECURITY IN WIRELESS SENSOR NETWORKS - A LAYER BASED CLASSIFICATION , 2007 .

[12]  Kyuho Lee,et al.  Wormhole Detection Method based on Location in Wireless Ad-Hoc Networks , 2007 .

[13]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[14]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[15]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .