Specification based IDS for camouflaging wormhole attack in OLSR

Wireless sensor networks (WSN) face different security threats that disrupt the normal activities and degrade the performance of the networks. The wormhole attack is one of the most severe security attacks in WSN. In this paper, we analyze the effect of the wormhole attack in Optimized Link State routing (OLSR), which is a standard proactive routing protocol for WSN. A modified version of wormhole attack is developed in this paper, called camouflaging wormhole attack, and a corresponding specification based IDS is designed to detect and prevent this attack. Finally, Network Simulator (NS2) is used to measure the performance of the propose algorithm. The subsequent experimental results show that the efficiency of the proposed scheme.

[1]  Hong Liang,et al.  Defending against wormhole attack in OLSR , 2006 .

[2]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[3]  Xiuping Liu,et al.  Wormhole Detection Algorithm Based on RTT and Neighborhood Information , 2014 .

[4]  Mahmuda Naznin Wireless Sensor Network: Coverage, Scheduling and Optimization , 2009 .

[5]  Jean-Philippe Babau,et al.  Detecting wormhole attacks in wireless networks using local neighborhood information , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.

[6]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[7]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[8]  Chi-Sung Laih,et al.  A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.

[9]  Brahim Bensaou,et al.  Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[10]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.