An efficient wormhole attack detection method in wireless sensor networks

Wireless sensor networks are now widely used in many areas, such as military, environmental, health and commercial applications. In these environments, security issues are extremely important since a successful attack can cause great damage, even threatening human life. However, due to the open nature of wireless communication, WSNs are liable to be threatened by various attacks, especially destructive wormhole attack, in which the network topology is completely destroyed. Existing some solutions to detect wormhole attacks require special hardware or strict synchronized clocks or long processing time. Moreover, some solutions cannot even locate the wormhole. In this paper, a wormhole attack detection method is proposed based on the transmission range that exploits the local neighborhood information check without using extra hardware or clock synchronizations. Extensive simulations are conducted under different mobility models. Simulation results indicate that the proposed method can detect wormhole attacks effectively and efficiently in WSNs.

[1]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[2]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[3]  Rutvij H. Jhaveri,et al.  MANET Routing Protocols and Wormhole Attack against AODV , 2010 .

[4]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[5]  Brahim Bensaou,et al.  Detecting and Avoiding Wormhole Attacks in Optimized Link State Routing Protocol , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[6]  Yunhao Liu,et al.  WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.

[7]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[8]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[9]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[11]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[12]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[13]  Bharat K. Bhargava,et al.  Defending against wormhole attacks in mobile ad hoc networks , 2006, Wirel. Commun. Mob. Comput..

[14]  Xiangke Liao,et al.  MDS-Based Wormhole Detection Using Local Topology in Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[15]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[16]  Issa M. Khalil,et al.  MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks , 2006, 2006 Securecomm and Workshops.

[17]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[18]  Noureddine Boudriga,et al.  A novel secure and multipath routing algorithm in Wireless Sensor Networks , 2010, 2010 International Conference on Data Communication Networking (DCNET).

[19]  P. Arun Raj Kumar,et al.  A Novel Solution for Discriminating Wormhole Attacks in MANETs from Congested Traffic using RTT and Transitory Buffer , 2013 .

[20]  Kashyap Patel,et al.  Detection of Wormhole Attack In Wireless Sensor Network , 2013 .

[21]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[22]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[23]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[24]  Jie Gao,et al.  Local connectivity tests to identify wormholes in wireless networks , 2011, MobiHoc '11.