Mitigation of Wormhole Attack in Wireless Sensor Networks

Wireless Sensor Networks is consisting of number of limited sensor devices which are communicated over the wireless media and it offers variety of solutions to military, healthcare and industrial applications. As sensor devices are resource restricted, the networks exposed to different types of attacks and conventional techniques against these attacks are not desirable and consequently utilizing WSNs with security services is a challenging. One severe attack, to detect and mitigate, is wormhole attack in which traffic will be forwarded from a location of network to another through the wormhole tunnel. In this paper we review WSN concepts and applications and discuss about security issues and challenges.

[1]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[2]  Aleksandar Milenkovic,et al.  Wireless sensor networks for personal health monitoring: Issues and an implementation , 2006, Comput. Commun..

[3]  Wei Yang,et al.  Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System , 2007, Sixth International Conference on Networking (ICN'07).

[4]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[5]  Fuxiang Gao,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.

[6]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[8]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[9]  Gicheol Wang,et al.  A Pair-Wise Key Agreement Scheme in Ad Hoc Networks , 2004, International Conference on Computational Science.

[10]  ALESSANDRA TONINELLI,et al.  Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.

[11]  G. Vinitha,et al.  An Approach Towards Detection of Wormhole Attack in Sensor Networks , 2010, 2010 First International Conference on Integrated Intelligent Computing.

[12]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[13]  Reihaneh Safavi-Naini,et al.  Distributed Detection of Wormhole Attacks in Wireless Sensor Networks , 2009, ADHOCNETS.

[14]  Peng Ning,et al.  Secure and resilient clock synchronization in wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[15]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[16]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[17]  Yu Wang,et al.  A multipath routing protocol for wireless sensor network for mine security monitoring , 2010 .

[18]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[19]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[20]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[21]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[22]  Yuguang Fang,et al.  Security in wireless sensor networks , 2007 .

[23]  YangYang,et al.  Wireless sensor and actuator networks , 2010 .

[24]  Kyung Jun Choi,et al.  Investigation of feasible cryptographic algorithms for wireless sensor network , 2006, 2006 8th International Conference Advanced Communication Technology.

[25]  Azzedine Boukerche,et al.  A Taxonomy of Routing Protocols in Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.

[26]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[27]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[28]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[29]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[30]  Ulrike Meyer,et al.  Security and privacy for mobile electronic health monitoring and recording systems , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[31]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[32]  Robert Steele,et al.  Elderly persons' perception and acceptance of using wireless sensor networks to assist healthcare , 2009, Int. J. Medical Informatics.

[33]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[34]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[35]  E. Rogers Diffusion of Innovations , 1962 .

[36]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[37]  Qianping Wang,et al.  The Research and Design of Routing Protocols of Wireless Sensor Network in Coal Mine Data Acquisition , 2007, 2007 International Conference on Information Acquisition.

[38]  Nora Cuppens-Boulahia,et al.  Securing the Communications of Home Health Care Systems Based on RFID Sensor Networks , 2010, 2010 8th Annual Communication Networks and Services Research Conference.

[39]  Rabi N. Mahapatra,et al.  Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[40]  Srdjan Capkun,et al.  Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.

[41]  Catherine Rosenberg,et al.  A Taxonomy-based Approach to Design of Large-scale Sensor Networks , 2008 .

[42]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[43]  Marios D. Dikaiakos,et al.  Data Privacy considerations in Intensive Care Grids , 2008, HealthGrid.

[44]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[45]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[46]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..