Skip to main content

2020 | OriginalPaper | Buchkapitel

Analysis of Wormhole Detection Features in Wireless Sensor Networks

verfasst von : Manish Patel, Akshai Aggarwal, Nirbhay Chaubey

Erschienen in: 4th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2019

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is very important for resource constrained wireless sensor networks due to their fundamental nature. The possible attacks in wireless sensor networks include sinkhole, wormhole, sybil, selective forwarding, blackhole etc. Wormhole is a gateway of many more attacks. To launch the attack is easy, but to detect it is very hard. For launching the attack, it is not required to know the cryptographic material or protocols used in the network. A malicious node attracts the traffic from one location and tunnels to another location and disturbs the whole routing process. In this paper, we have discussed various features for wormhole attack detection in wireless sensor networks.

Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE (2003) Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE (2003)
2.
Zurück zum Zitat Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)CrossRef
3.
Zurück zum Zitat Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 21–32, October 2003 Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 21–32, October 2003
4.
Zurück zum Zitat Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: ACM, WiSec 2009, Zurich, Switzerland, 16–18 March 2009 Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: ACM, WiSec 2009, Zurich, Switzerland, 16–18 March 2009
5.
Zurück zum Zitat Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)CrossRef Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)CrossRef
6.
Zurück zum Zitat Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings INFOCOM, pp. 107–115 (2007) Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings INFOCOM, pp. 107–115 (2007)
7.
Zurück zum Zitat Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 (2009)CrossRef Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 (2009)CrossRef
8.
Zurück zum Zitat Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor networks with statistical analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010) Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor networks with statistical analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010)
9.
Zurück zum Zitat Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing, p. 6 (2006) Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing, p. 6 (2006)
10.
Zurück zum Zitat Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–593 (2013)CrossRef Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–593 (2013)CrossRef
11.
Zurück zum Zitat Lai, G.H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016)CrossRef Lai, G.H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016)CrossRef
12.
Zurück zum Zitat Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a wsn under wormhole attack. In: ACM, MSWiM 2007, Chaina, Greece, 22–26 October 2007 Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a wsn under wormhole attack. In: ACM, MSWiM 2007, Chaina, Greece, 22–26 October 2007
14.
Zurück zum Zitat Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331–340, September 2007 Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331–340, September 2007
15.
Zurück zum Zitat Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004) Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004)
16.
Zurück zum Zitat Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 13 (2016). Hindawi Publishing Corporation, Article ID 8354930 Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 13 (2016). Hindawi Publishing Corporation, Article ID 8354930
17.
Zurück zum Zitat Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. J. Ad Hoc Netw. 7(6), 1051–1063 (2008)CrossRef Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. J. Ad Hoc Netw. 7(6), 1051–1063 (2008)CrossRef
18.
Zurück zum Zitat Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009) Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009)
19.
Zurück zum Zitat Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(356382), 16 (2015). Article ID 356382 Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(356382), 16 (2015). Article ID 356382
20.
Zurück zum Zitat Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise–tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006)CrossRef Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise–tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006)CrossRef
21.
Zurück zum Zitat Dong, D., Liu, Y., Li, X. Y., Liao, X., Li, M.: Topological detection on wormholes in wireless ad hoc and sensor networks. In: 17th IEEE International Conference on Network Protocols, pp. 314–323 (2009) Dong, D., Liu, Y., Li, X. Y., Liao, X., Li, M.: Topological detection on wormholes in wireless ad hoc and sensor networks. In: 17th IEEE International Conference on Network Protocols, pp. 314–323 (2009)
22.
Zurück zum Zitat Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: ACM, MobiHoc 2011, Paris, France 16–20 May 2011 Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: ACM, MobiHoc 2011, Paris, France 16–20 May 2011
23.
Zurück zum Zitat Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer (2005) Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer (2005)
24.
Zurück zum Zitat Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe 2004, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004) Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe 2004, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004)
25.
Zurück zum Zitat Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 9 (2012). Article ID 145702 Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 9 (2012). Article ID 145702
26.
Zurück zum Zitat Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016, 15 (2016). Article ID 3405264 Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016, 15 (2016). Article ID 3405264
27.
Zurück zum Zitat Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems, pp. 1–6 (2014) Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems, pp. 1–6 (2014)
28.
Zurück zum Zitat Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13, 27–59 (2007)CrossRef Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13, 27–59 (2007)CrossRef
29.
Zurück zum Zitat Matam, R., Tripathy, S.: WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 180 (2013). SpringerCrossRef Matam, R., Tripathy, S.: WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 180 (2013). SpringerCrossRef
30.
Zurück zum Zitat Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., Economides, A.: EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, pp. 103–109 (2016) Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., Economides, A.: EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, pp. 103–109 (2016)
31.
Zurück zum Zitat Chen, H., Chen, W., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014(1), 10 (2014) Chen, H., Chen, W., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014(1), 10 (2014)
Metadaten
Titel
Analysis of Wormhole Detection Features in Wireless Sensor Networks
verfasst von
Manish Patel
Akshai Aggarwal
Nirbhay Chaubey
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_3