Detection and Mitigation from Wormhole Based Protocol Deviation Depends on Neighbor Discovery Approach In WSN

  • Authors

    • Sandip Mandal
    • Rama Sushil
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.17.21804
  • Wireless Sensor Networks, Wormhole, Denial of Service, Routing Attacks, In-Band Wormhole.
  • Wireless Sensor Networks (WSN) are composed of a large ,yet limited number of sensing devices called sensors, communicating over a wireless media. Wireless sensor networks find prospective applications in fields like environmental monitoring, healthcare, battlefield surveillance, and homeland security. A much broader spectrum of future applications is likely to follow. Deployment of WSN in hostile environments, unattended operation, openness of communication and resource constraints e.g. limited memory, energy and computational capabilities exposes WSN to a number of security attacks. The resource constrained nature of WSN makes conventional security mechanisms incongruous to apply. In this paper, an In-Band wormhole attack on a wireless sensor network is studied, in which an adversary creates a link between two regions of the network by using colluding network nodes. The impact of an In-Band wormhole attack on data transmission and energy consumption in the network is studied and a reactive recovery mechanism to detect and mitigate the Denial of Service effect caused due to it is presented.

     

     

  • References

    1. [1] Prasannajit B, Anupama, Vindhykumari, Subhashini and Vinitha , “An Approach Towards Detection Of Wormhole Attack in Sensor Networks,†Integrated Intelligent Computing (ICIIC) First International Conference on,IEEE , E-ISBN 978-0-7695-4152-5 pp 283-289 , 2010

      [2] Karlof & Wanger, “Secure Routing in Wireless Sensor Network: Attacks and Countermeasures,†First IEEE International Workshop on Sensor Network Protocols and Applications,SNPA, pp 113-127 2003

      [3] Khalil, Bagchi, & Shroff, “LiteWorp:Detection And Isolation Of The Wormhole Attack in Static Multihop Wireless Networks ,†International Journal Of Computer And Telecommunications Networking,vol. 51(13),pp 3750-3772

      [4] Y. C. Hu, A. Perrig and D. B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, “ 22nd Annual Joint Conferenceof the IEEE Computer and Communications Societies(INFOCOM), pp. 1976-1986 ,2003

      [5] Van Tran, Le Xuan Hung, Young-Koo Lee, Sungyoung Lee and Heejo Lee,â€TTM: An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks, “4th IEEE conference on Consumer Communications and Networking Conference, pp. 593 – 598

      [6] J. Zhen and S. Srinivas, “Preventing replay attacks for secure routing in ad hoc networks, “Proceedings of 2nd Ad Hoc Networks & Wireless (ADHOCNOW'03), pp. 140—150,2003

      [7] W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks, “WiSe, Proceedings ofthe 2004 ACM workshop on Wireless security. ACM Press, pp. 51−60 , 2004

      [8] S. Özdemir, M. Meghdadi, and Ã. Güler, “A time andtrust based wormhole detection algorithm for wirelesssensor networks,†3rd Information Security andCryptology Conference (ISC′08), pp. 139−4, 2008

      [9] Ali Modirkhazeni, Saeedeh Aghamahmoodi, ArsalanModirkhazeni,NaghmehNiknejad,â€Distributed

      [10] Approach to Mitigate Wormhole Attack in WirelessSensor Networksâ€IEEE,pp 122-128 , 2011

      [11] Phillip Lee,Andrew Clark,Linda Bushnell1,and RadhaPoovendran, “A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems ,â€IEEE Transactions onAutomatic Control, Special Issue On Control of Cyber Physical Systems 2013

      [12] Yih-Chun Hu,Adrian Perrig and David B.johnson. Packet leashes: A defense aginst wormhole attacks in wireless networks. In Proceedings of IEEE Infocom 2003, April 2003.

      [13] Ari Juels and John Brainard. Client puzzles : A cryptographic defence aginst connection depletion attacks.In S.Kent,editor,Proceedings of NDSS ’99 (Networks and Distributed Security systems), pages 151.165,1999

      [14] Tuomas Aura,Pekka Nikander,and Jussipekka Leiwo. DOS-resistant authentication with client puzzles.Lecture Notes in Computer Science, 2133:170.177, 2001.

      [15] Jiang changyong, Zhang jianming. “The selective forwarding attacks detection in WSNsâ€. Computer Engineering, 2009, 35(21):140-143

      [16] Bo Yu and Bin Xiao. Detecting selective forwarding attacks in wireless sensor networks. In Parallel and Distributed Processing Symposium, 2006. IPDPS 2006. 20th International, page 8 pp., 2006.

      [17] Sophia Kaplantzis , Alistair Shilton , Nallasamy Mani , Y. Ahmet S¸ekercio glu ,†Detecting Selective Forwarding Attacks in Wireless Sensor Networks using Support Vector Machinesâ€, intelligent sensors, sensor networks and information ,3rd international conference ,pg 335 – 340,ISSNIP 2007 .

      [18] Jeremy Brown and Xiaojiang Du. Detection of selective forwarding attacks in heterogeneous sensor networks. In ICC, pages 1583–1587, 2008

      [19] Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, and Wang Liangmin. Lightweight defense scheme against selective forwarding attacks in wireless sensor networks. pages 226 –232, oct. 2009

      [20] Zurina Mohd Hanapi, Mahmod Ismail and Kasmiran Jumari, Priority and Random Selection for Dynamic Window Secured Implicit Geographic Routing in Wireless Sensor Networkâ€, American Journal of Engineering and Applied Sciences 2 (2): 494- 500, 2009

      [21] Riaz Ahmed Shaikh, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee and Young-Jae Song,†Achieving Network Level Privacy in Wireless Sensor Networks “,Sensors 2010, 10, 1447-1472; doi:10.3390/s100301447

      [22] Guorui Li, Xiangdong Liu, and Cuirong Wang “A Sequential Mesh Test based Selective Forwarding Attack Detection Scheme in Wireless Sensor Networksâ€

  • Downloads

  • How to Cite

    Mandal, S., & Sushil, R. (2018). Detection and Mitigation from Wormhole Based Protocol Deviation Depends on Neighbor Discovery Approach In WSN. International Journal of Engineering & Technology, 7(4.17), 62-65. https://doi.org/10.14419/ijet.v7i4.17.21804