An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode

Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes promiscuous mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network.

[1]  Arindam Ghosh,et al.  Analysis of Denial-of-Service attacks on Wireless Sensor Networks using simulation , 2011 .

[2]  Liang Hong,et al.  Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[3]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[4]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[5]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[6]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[7]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[8]  Baruch Awerbuch,et al.  An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.

[9]  Honglong Chen,et al.  Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks , 2009, UIC.

[10]  King-Shan Lui,et al.  DelPHI: wormhole detection mechanism for ad hoc wireless networks , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.

[11]  Moutushi Singh,et al.  A Survey of Different Techniques for Detection of Wormhole Attack in Wireless Sensor Network , 2012 .

[12]  Xice Sun,et al.  A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..

[13]  Khin Sandar Win,et al.  Analysis of Detecting Wormhole Attack in Wireless Networks , 2008 .

[14]  Rituparna Chaki,et al.  A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks , 2010, ArXiv.

[15]  Wang Chunlei,et al.  Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .

[16]  Gurpreet Singh Josan,et al.  Performance Analysis of AODV & DSR Routing Protocols in Wireless Sensor Networks , 2012 .

[17]  Charles E. Perkins,et al.  Multicast operation of the ad-hoc on-demand distance vector routing protocol , 1999, MobiCom.

[18]  Rituparna Chaki,et al.  IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network , 2007, 6th International Conference on Computer Information Systems and Industrial Management Applications (CISIM'07).

[19]  Sommart Khamkleang,et al.  PERFORMANCE ANALYSIS OF AODV AND DSR ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS , 2012 .

[20]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[21]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[22]  Oivind Kure,et al.  Secure Extension to the OLSR protocol , 2004 .

[23]  Rakhi Khandelwal,et al.  A Survey of Detection of Wormhole Attacks in Wireless Sensor Network , 2014 .

[24]  Magdy S. El-Soudani,et al.  A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks , 2009, ArXiv.