Prevention of Wormhole Attacks in Wireless Sensor Networks

Security of deployed wireless sensor networks (WSNs) has become a crucial task as the deployment of WSN'S grows. This paper proposes a novel way and develops a mechanism to prevent wormhole attacks by an algorithm to manage a large number of nodes using node ID. Also, the proposal creates a load balancing feature for monitoring a hierarchical system for nodes and extra packet header on each node to make sure it is not compromised. Even though an attack is inevitable on a live node network using a simulator, this paper has shown how the network nodes can be rerouted to avoid the attacked nodes.

[1]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[2]  Majid Naderi,et al.  New approach for detection and defending the wormhole attacks in Wireless ad hoc networks , 2010, 2010 18th Iranian Conference on Electrical Engineering.

[3]  Heejo Lee,et al.  TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.

[4]  Neelima Gupta,et al.  FEEPVR: First End-to-End Protocol to Secure Ad Hoc Networks with Variable Ranges against Wormhole Attacks , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[5]  Jalel Ben-Othman,et al.  Logical Wormhole Prevention in Optimized Link State Routing Protocol , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[6]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Honglong Chen,et al.  Secure localization against wormhole attacks using conflicting sets , 2010, International Performance Computing and Communications Conference.

[8]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[9]  Prashant Krishnamurthy,et al.  SECUND: A protocol for SECUre neighborhooD creation in wireless ad hoc networks , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[10]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[11]  Neelima Gupta,et al.  SEEEP: Simple and Efficient End-to-End Protocol to Secure Ad Hoc Networks against Wormhole Attacks , 2008, 2008 The Fourth International Conference on Wireless and Mobile Communications.

[12]  Brahim Bensaou,et al.  Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[13]  Tassos Dimitriou,et al.  Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks , 2010, DCOSS.

[14]  Magdy S. El-Soudani,et al.  An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).

[15]  D. Sreenivasa Rao,et al.  A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .

[16]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[17]  C. Shobha Bindu,et al.  Detection and Prevention of Layer-3 Wormhole Attacks on Boundary State Routing in Ad Hoc Networks , 2010, 2010 International Conference on Advances in Computer Engineering.

[18]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[19]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[20]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.