Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks

This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complications arising from a specific type of security breach, the wormhole attack. Wormhole attacks against WSNs are classified as passive, external laptop-class threats. Because malicious wormhole attacks are increasing, these attacks pose a serious security threat and increase the costs to maintain a Wireless Sensor Network. Research into preventing wormhole attacks yields two distinct model approach types: Administrator-Viewpoint models and User-Viewpoint models. While the modalities vary, the four Administrator-Viewpoint models reviewed were designed in the early 2000s and suggest defending against wormhole attacks through the use of expensive hardware, packet leashes, or topology visualization systems. On the other hand, the four proposed User-Viewpoint models have become the current theoretical models of choice.  While existing as simulation approaches to defend against wormhole attacks, the User-Viewpoint models use internally calculated routing algorithms to suggest routes to avoid or evade, not defend against, established wormhole routes. This paper confirms the efficacies of the User-Viewpoint models in the lab simulations are viewed as the most promising cost-effective, future security solutions to wormhole attacks.

[1]  İnan Güler,et al.  A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks , 2011 .

[2]  Mohammed Feham,et al.  Wormhole attack detection in wireless sensor networks , 2016, 2016 SAI Computing Conference (SAI).

[3]  Network LOCATION DISCOVERY WITH SECURITY IN WIRELESS SENSOR NETWORK , 2011 .

[4]  T. P. Sharma,et al.  A New Approach to Secure Data Aggregation protocol for Wireless Sensor Network , 2010 .

[5]  G. Gong,et al.  A Survey on Security in Wireless Sensor Networks , 2008 .

[6]  Xice Sun,et al.  A Secure Localization Approach against Wormhole Attacks Using Distance Consistency , 2010, EURASIP J. Wirel. Commun. Netw..

[7]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[8]  An Liu,et al.  Wireless Sensor Network Security , 2013, Int. J. Distributed Sens. Networks.

[9]  Chi-Sung Laih,et al.  A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET , 2009, Sensors.

[10]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[11]  Jyoteesh Malhotra,et al.  Security Issues and Attacks in Wireless Sensor Networks , 2015 .

[12]  Khalil El-Khatib,et al.  Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves , 2009, J. Interconnect. Networks.

[13]  Pooja Sharma An Effective Approach for Providing Anonymity in Wireless sensor Network: Detecting Attacks and Security Measures , 2010 .

[14]  Wang Chunlei,et al.  Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .

[15]  José Manuel Moya,et al.  Detecting Unknown Attacks in Wireless Sensor Networks That Contain Mobile Nodes , 2012, Sensors.

[16]  Radha Poovendran,et al.  Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[17]  K. E. Naresh Kumar,et al.  TCPL: A Defense against wormhole attacks in wireless sensor networks , 2010 .

[18]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).