Circumventing Sinkholes and Wormholes in Wireless Sensor Networks

Sensor networks are formed with the help of a large number of wireless nodes, generally with limited energy, computation and transmission powers. Each node helps every other node in the network by forwarding their packets. All is well if such an altruistic attitude is upheld by all participating nodes. However, as these nodes often operate in a physically insecure environment, they are vulnerable to capture and compromise. In addition, the communication medium being wireless, restricts enforcement of rigourous node memberships and so a number of malicious nodes also participate in the network. These nodes, in order to snoop or sabotage, can carry out a variety of attacks against the network including sinkhole and wormhole attacks. In this paper, we present a novel trust-based scheme for identifying and isolating malicious nodes, which launch these two types of attacks in a sensor network.

[1]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[2]  Samir R. Das,et al.  On-demand multipath routing for mobile ad hoc networks , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).

[3]  Yih-Chun Hu,et al.  Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.

[4]  Levente Buttyán,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.

[5]  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[6]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[7]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[8]  Joe F. Chicharo,et al.  Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[9]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[10]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[11]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[12]  O. Kachirski,et al.  Intrusion detection using mobile agents in wireless ad hoc networks , 2002, Proceedings. IEEE Workshop on Knowledge Media Networking.

[13]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[14]  David B. Johnson,et al.  The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .

[15]  Alan D. Ross,et al.  Network Security Essentials , 2003 .

[16]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[17]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[18]  Anna Hać,et al.  Wireless Sensor Network Designs , 2003 .

[19]  S. Carter Secure Position Aided Ad Hoc Routing , 2003 .

[20]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  Chris McDonald,et al.  Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.

[22]  Edward W. Knightly,et al.  Denial of service resilience in ad hoc networks , 2004, MobiCom '04.

[23]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[24]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[25]  Ian T. Downard,et al.  Simulating Sensor Networks in NS-2 , 2004 .

[26]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.

[27]  Amitava Datta,et al.  Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).

[28]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[29]  Chris McDonald,et al.  Secure Pervasive Computing without a Trusted Third Party , 2004, The IEEE/ACS International Conference on Pervasive Services.

[30]  Chris McDonald,et al.  Secure Routing Protocols for Mobile Ad-Hoc Wireless Networks , 2005 .