Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks

Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detection and positioning scheme based on mobile beacon, which can not only detect the existence of wormhole attacks, but also accurately localize the attackers for the system to eliminate them out of the network. The main idea is to detect whether the communication between the mobile beacon and each of the static beacons violates the communication properties and then the attacker can be estimated as the center of its communication area by determining the intersection point of the chords’ perpendicular bisector. The simulation results illustrate that our proposed scheme can obtain a high wormhole attack detection probability as well as a high attackers positioning accuracy.

[1]  Honglong Chen,et al.  Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks , 2010, 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage.

[2]  Yih-Chun Hu,et al.  Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.

[3]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[4]  Tassos Dimitriou,et al.  Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.

[5]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[6]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Chun Tung Chou,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2006 .

[8]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[9]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Jie Gao,et al.  Local connectivity tests to identify wormholes in wireless networks , 2011, MobiHoc '11.

[11]  Honglong Chen,et al.  Secure localization against wormhole attacks using conflicting sets , 2010, International Performance Computing and Communications Conference.

[12]  Honglong Chen,et al.  On providing wormhole-attack-resistant localization using conflicting sets , 2015, Wirel. Commun. Mob. Comput..

[13]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[14]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[15]  Aihua Xia,et al.  Securing DV-Hop localization against wormhole attacks in wireless sensor networks , 2015, Pervasive Mob. Comput..

[16]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[17]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[18]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.