Wireless sensors networks (WSNs) consist of a large number of tiny, spatially distributed, and autonomous devices, called sensor nodes. The latter are equipped with sensing, computation, and wireless communications capabilities, and have very limited resources. Wireless sensor networks have been widely used in remote areas, military scenarios, sensing motion applications, agriculture solutions and natural disaster hitted areas. Interest in the area of Wireless sensor networks is growing since last few years because of its practical applications. These networks are equipped with large number of sensors, which are spatially distributed. Wireless sensor networks are widely used in remote areas, defense and military scenarios. Hence, their security is critical issue. They are more vulnerable to attacks than wired networks. Wireless sensor networks suffer from various active and passive attacks. One of such type of attack is Wormhole attack. In this, pair of nodes creates a virtual tunnel in the network. The malicious node at one end, capture the packets and tunnel them to another malicious node. Wormhole is a severe attack which can affect the route discovery process of the network. In this paper, we propose a solution to the wormhole attack in one of the most prominent AODV (ad-hoc on demand distance vector) routing protocol. The proposed method works for the detection and prevention of the wormhole attack in sensor networks. In the proposed method, a sensor can detect the fake neighbors which are caused by wormhole through the neighbor discovery process, and then a Manhattan Distance algorithm is used to detect and prevent wormhole attack according to the neighbor information and the broadcasting nature for distinct and reliable communication. Manhattan algorithm makes the broadcasting and packet forwarding more reliable and secure and furthermore prevents the simulation from any malicious attack. The proposed method reduces the delay in the network to a considerable extent thereby enhancing the performance.
[1]
E. A. Mary Anita,et al.
Defending against worm hole attacks in multicast routing protocols for mobile ad hoc networks
,
2011,
2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[2]
Noureddine Boudriga,et al.
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks
,
2009,
2009 Eighth IEEE International Symposium on Network Computing and Applications.
[3]
Qin Li,et al.
Efficiently detecting wormhole attacks in sensor networks by information potential
,
2008,
2008 Third International Conference on Communications and Networking in China.
[4]
A. Mahajan,et al.
A survey of architecture and node deployment in Wireless Sensor Network
,
2008,
2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).
[5]
Yixian Yang,et al.
A ranging based scheme for detecting the wormhole attack in wireless sensor networks
,
2012
.
[6]
Yih-Chun Hu,et al.
Packet leashes: a defense against wormhole attacks in wireless networks
,
2003,
IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).