RTT Centered Automatic and Dynamic Wormhole Attack Discovery in Sensor Network

Sensor systems are acquiring more fame because of their wide range of applications like process automation, environment (habitat) monitoring, seismic monitoring, and battlefield surveillance. Though they are popular because of their applications, they do come with various challenges like random deployment of nodes, limited energy, computation and memory. Apart from these challenges, the most critical aspect to handle is security. Information is exchanged in Wireless Sensor Networks (WSNs) between the nodes through wireless links in “air” through electromagnetic waves. This feature attracts the invaders to steal data, disrupt the normal system action by disturbing the data flow and so on. WSNs are prone to attacks at various layers of networks like jamming, denial of service, sinkhole, black hole, wormhole to name a few. Each attack is characterized by its own consequences. Various countermeasures are proposed to defend against these various attacks. Out of these attacks, we pick up wormhole attack at network layer because of its unique nature. Wormhole attack can be launched in the network even if the network is secured with cryptographic techniques. In this paper we address wormhole attack by proposing a RTT centered Wormhole Outbreak discovery. Our proposed system is simple with no extra hardware requirement and no tight clock synchronization.

[1]  R. Poovendran,et al.  Modeling node capture attacks in wireless sensor networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[2]  Lei Wang,et al.  Defense Technology of Wormhole Attacks Based on Node Connectivity , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[3]  El Kaissi,et al.  DAWWSEN a defense mechanism against wormhole attacks in wireless sensor networks - by Rouba Zakaria El Kaissi , 2005 .

[4]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[5]  United Arab Emirates,et al.  Dealing with Sinkhole Attacks in Wireless Sensor Networks , 2013 .

[6]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[7]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[8]  Saurabh Singh,et al.  Security For Wireless Sensor Network , 2011 .

[9]  Prashant Krishnamurthy,et al.  DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[10]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[11]  Tae Ho Cho,et al.  A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks , 2013 .

[12]  Bharat K. Bhargava,et al.  E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[13]  Lin Yao,et al.  An efficient wormhole attack detection method in wireless sensor networks , 2014, Comput. Sci. Inf. Syst..

[14]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[15]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[16]  Mohammed Feham,et al.  Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).

[17]  Yixian Yang,et al.  A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .

[18]  Sheng Zhong,et al.  DAWN: Defending against wormhole attacks in wireless network coding systems , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[19]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[20]  V. B. Vaghela,et al.  Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV Protocol , 2016 .

[21]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[22]  Fuxiang Gao,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.

[23]  Neha Agrawal,et al.  RTT Based Wormhole Detection Using NS-3 , 2014, 2014 International Conference on Computational Intelligence and Communication Networks.

[24]  Rajpal Singh Khainwar,et al.  Enhancement of Routes Performance in MANET Avoiding Tunneling Attack , 2012 .

[25]  Bouabdellah Kechar,et al.  A time Petri net model for wormhole attack detection in wireless sensor networks , 2013, 2013 International Conference on Smart Communications in Network Technologies (SaCoNeT).

[26]  Yunhao Liu,et al.  Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.

[27]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[28]  Luay A. Wahsheh,et al.  Security of Wireless Sensor Networks , 2011, 2011 Eighth International Conference on Information Technology: New Generations.

[29]  Subrat Kar,et al.  WHOP: Wormhole attack detection protocol using hound packet , 2011, 2011 International Conference on Innovations in Information Technology.

[30]  Daniel Sora,et al.  Security Issues in Wireless Sensor Networks , 2010, Int. J. Online Eng..

[31]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[32]  Heejo Lee,et al.  Achieving Network Level Privacy in Wireless Sensor Networks† , 2010, Sensors.

[33]  Parli B. Hari,et al.  Security issues in Wireless Sensor Networks: Current research and challenges , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).

[34]  Sanjay Kumar Madria,et al.  SeRWA: A secure routing protocol against wormhole attacks in sensor networks , 2009, Ad Hoc Networks.