Detection of wormhole attacks in wireless sensor networks using range-free localization

Wireless sensor networks (WSNs), due to the limited resources of the nodes, are highly vulnerable to attacks at all network layers; however, the so-called “wormhole attack” is particularly challenging because it resists defensive measures exclusively based on cryptographic protocols. In this paper we propose two wormhole detection procedures for WSNs, based on concepts employed in a kind of range-free localization methods: one of the approaches performs the detection simultaneously with the localization procedure, and the other operates after the conclusion of the location discovery protocol. Both strategies are effective in detecting wormhole attacks, but their performance is fairly sensitive to shadowing effects present in the radio channels.

[1]  Tarek F. Abdelzaher,et al.  Range-free localization and its impact on large scale sensor networks , 2005, TECS.

[2]  R.L. Moses,et al.  Locating the nodes: cooperative localization in wireless sensor networks , 2005, IEEE Signal Processing Magazine.

[3]  Kui Wu,et al.  Sensor localization with Ring Overlapping based on Comparison of Received Signal Strength Indicator , 2004, 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE Cat. No.04EX975).

[4]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[5]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[6]  Srdjan Capkun,et al.  Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.

[7]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[8]  Srdjan Capkun,et al.  ROPE: robust position estimation in wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[9]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[10]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Alfred O. Hero,et al.  Relative location estimation in wireless sensor networks , 2003, IEEE Trans. Signal Process..