A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks

Security is one of the major and important issues surrounding network sensors because of its inherent liabilities, i.e. physical size. Since network sensors have no routers, all nodes involved in the network must share the same routing protocol to assist each other for the transmission of packets. Also, its unguided nature in dynamic topology makes it vulnerable to all kinds of security attack, thereby posing a degree of security challenges. Wormhole is a prominent example of attacks that poses the greatest threat because of its difficulty in detecting and preventing. In this paper, we proposed a wormhole attach detection and prevention mechanism incorporated AODV routing protocol, using neighbour discovery and path verification mechanism. As compared to some preexisting methods, the proposed approach is effective and promising based on applied performance metrics.

[1]  Pawan Ahuja,et al.  Performance evaluation and comparison of AODV and DSR routing protocols in MANETs under wormhole attack , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).

[2]  Lin Yao,et al.  An efficient wormhole attack detection method in wireless sensor networks , 2014, Comput. Sci. Inf. Syst..

[3]  Amin Karami,et al.  A Framework for Uncertainty-Aware Visual Analytics in Big Data , 2015, AIC.

[4]  Pravin Khandare,et al.  Public Key Encryption and 2Ack Based Approach to Defend Wormhole Attack , 2013 .

[5]  Sakshi Kaushal,et al.  Reactive protocols analysis with wormhole attack in ad-hoc networks , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[6]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[7]  Saurabh Ganeriwal,et al.  Timing-sync protocol for sensor networks , 2003, SenSys '03.

[8]  Swati Bhagat,et al.  A detection and prevention of wormhole attack in homogeneous Wireless sensor Network , 2016, 2016 International Conference on ICT in Business Industry & Government (ICTBIG).

[9]  Dayashankar Singh,et al.  WADP: A wormhole attack detection and prevention technique in MANET using modified AODV routing protocol , 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS).

[10]  Manel Guerrero Zapata,et al.  Mining and Visualizing Uncertain Data Objects and Named Data Networking Traffics by Fuzzy Self-Organizing Map , 2014, AIC.

[11]  Baek-Young Choi,et al.  Statistical wormhole detection for mobile sensor networks , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[12]  Amarjit Malhotra,et al.  Wormhole attack prevention using clustering and digital signatures in reactive routing , 2012, Proceedings of 2012 9th IEEE International Conference on Networking, Sensing and Control.

[13]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[14]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[15]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[16]  Manel Guerrero Zapata,et al.  A hybrid multiobjective RBF-PSO method for mitigating DoS attacks in Named Data Networking , 2015, Neurocomputing.

[17]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[18]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[19]  Manel Guerrero Zapata,et al.  A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks , 2015, Neurocomputing.

[20]  Manel Guerrero Zapata,et al.  An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking , 2015, Comput. Networks.

[21]  Pallavi Sharma,et al.  An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.