Detection of Hidden Wormhole Attack in Wireless Sensor Networks using Neighborhood and Connectivity Information

Wireless sensor networks (WSNs) have inspired many applications such as military applications, environmental monitoring and other fields. WSN has emergence in various fields, so security is very important issue for sensor networks. Security comes from attacks. Due to the wireless and distributed nature anyone can connect with the network. Among all possible attacks, wormholes are very hard to detect because they can cause damage to the network without knowing the protocols used in the network. It is a powerful attack that can be conducted without requiring any cryptographic breaks. Wormholes are hard to detect because they use a private, out-of-band channel invisible to the underlying sensor network. In this paper we have proposed a wormhole detection protocol based on neighborhood and connectivity information. Performance analysis shows that our proposed approach can effectively detect wormhole attack with less storage cost. Keywords: Wireless sensor network, wormhole, out-of-band, security, neighborhood.

[1]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[2]  Kay Römer,et al.  The design space of wireless sensor networks , 2004, IEEE Wireless Communications.

[3]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[4]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[5]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[6]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[7]  Majid Khabbazian,et al.  Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks , 2009, IEEE Transactions on Wireless Communications.

[8]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[9]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[10]  Chia-Mei Chen,et al.  Distributed Detection of Wormholes and Critical Links in Wireless Sensor Networks , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[13]  David A. Wagner,et al.  Secure verification of location claims , 2003, WiSe '03.

[14]  Yanjun Li,et al.  Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[15]  G. Vinitha,et al.  An Approach Towards Detection of Wormhole Attack in Sensor Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.

[16]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[17]  Jie Gao,et al.  Local connectivity tests to identify wormholes in wireless networks , 2011, MobiHoc '11.

[18]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[19]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[20]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[21]  Radha Poovendran,et al.  SeRLoc: Robust localization for wireless sensor networks , 2005, TOSN.

[22]  Yurong Xu,et al.  Analysis of range-free anchor-free localization in a wsn under wormhole attack , 2007, MSWiM '07.

[23]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[24]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[25]  Prashant Krishnamurthy,et al.  DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[26]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[27]  Nader Mohamed,et al.  Middleware: middleware challenges and approaches for wireless sensor networks , 2006, IEEE Distributed Systems Online.

[28]  Tae Ho Cho,et al.  A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks , 2013 .

[29]  Srdjan Capkun,et al.  Secure positioning of wireless devices with application to sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[30]  Panagiotis Papadimitratos,et al.  A practical secure neighbor verification protocol for wireless sensor networks , 2009, WiSec '09.

[31]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[32]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[33]  Fuxiang Gao,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.

[34]  Radha Poovendran,et al.  HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[35]  Xice Sun,et al.  A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..

[36]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[37]  Noureddine Boudriga,et al.  Digital Investigation of Wormhole Attacks in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[38]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[39]  Yi Mu,et al.  Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..

[40]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[41]  Song Han,et al.  Taxonomy of Attacks on Wireless Sensor Networks , 2006 .