Wormhole attack detection in wireless sensor networks

A wireless sensor network (WSN) consists of a large number of sensor nodes with limited batteries, the sensoring devices are deployed randomly on a zone to collect data. WSNs are threatened by several malicious behaviors caused by some nodes. The impact of such behaviors can be serious, even fatal, due to the collaborative nature of nodes in a network without fixed infrastructure. Then, in this work we have referred to the need for a secure network communication network with mechanisms that take into account the limited resources of the nodes. In order to achieve such a security, the network can be split into sectors, and mobile agents (MAs) can be used to reject traffic intruders caused by Wormhole attacks taking into account energy constraint. Wormhole attack is a denial of service attack launched by malicious nodes by creating a tunnel through which the packets are replayed to malicious nodes disrupting the communication channel and corrupting network routing. In order to evaluate the performance of our proposal, we have carried out several simulation tests using the SINALGO simulator. The results obtained show that our proposal extends the life of the network, in terms of energy consumption and the rate of packet delivery.

[1]  F. H. SUMNER Computing Conference , 1968, Nature.

[2]  Mohamed F. Younis,et al.  TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks , 2012, IEEE Transactions on Network and Service Management.

[3]  Amiya Nayak,et al.  Carrier-Based Focused Coverage Formation in Wireless Sensor and Robot Networks , 2011, IEEE Transactions on Automatic Control.

[4]  Victor C. M. Leung,et al.  Energy-Efficient Itinerary Planning for Mobile Agents in Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[5]  Marcin Poturalski,et al.  A Low-Cost Secure Neighbor Verification Protocol for Wireless Sensor Networks , 2008 .

[6]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[7]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[8]  Mohamed F. Younis,et al.  Exploiting architectural techniques for boosting base-station anonymity in wireless sensor networks , 2012, Int. J. Sens. Networks.

[9]  Xiang-Yang Li,et al.  Wireless Ad Hoc and Sensor Networks: Security of Wireless Ad Hoc Networks , 2008 .

[10]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[13]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[14]  Jean-Philippe Babau,et al.  An Ontology for Attacks in Wireless Sensor Networks , 2007 .

[15]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.