A ranging based scheme for detecting the wormhole attack in wireless sensor networks

Abstract Wireless sensor networks have been widely used in general and military scenarios. And this leads to a need for more security. Wireless sensor network are easy vulnerable to attack and compromise. Wormhole attack is a harmful against routing protocol which can drop data randomly or disturbing routing path. In this paper, we proposed a novel method to detect the wormhole attack based on statistical analysis. In the proposed method, a sensor can detect the fake neighbors which are caused by wormhole through the neighbor discovery process, and then a k-means clustering based method is used to detect wormhole attack according to the neighbor information. That is, by using this proposed method, we can detect the wormhole only by the neighbor information without any special requirement. We did some experiments to evaluate the performance of this method, and the experimental results show that our method can achieve satisfying results.

[1]  Noureddine Boudriga,et al.  Digital Investigation of Wormhole Attacks in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[2]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[3]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Chia-Mei Chen,et al.  A Group-Based Deployment for Wormhole Prevention in Sensor Networks , 2011, J. Inf. Sci. Eng..

[5]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[6]  A. Mahajan,et al.  A survey of architecture and node deployment in Wireless Sensor Network , 2008, 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT).

[7]  Xice Sun,et al.  A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..

[8]  Qin Li,et al.  Efficiently detecting wormhole attacks in sensor networks by information potential , 2008, 2008 Third International Conference on Communications and Networking in China.