Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2020 | OriginalPaper | Chapter

Analysis of Wormhole Detection Features in Wireless Sensor Networks

share
SHARE

Abstract

Security is very important for resource constrained wireless sensor networks due to their fundamental nature. The possible attacks in wireless sensor networks include sinkhole, wormhole, sybil, selective forwarding, blackhole etc. Wormhole is a gateway of many more attacks. To launch the attack is easy, but to detect it is very hard. For launching the attack, it is not required to know the cryptographic material or protocols used in the network. A malicious node attracts the traffic from one location and tunnels to another location and disturbs the whole routing process. In this paper, we have discussed various features for wormhole attack detection in wireless sensor networks.
Literature
1.
go back to reference Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE (2003) Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986. IEEE (2003)
2.
go back to reference Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006) CrossRef Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006) CrossRef
3.
go back to reference Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 21–32, October 2003 Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM Workshop on Security of Ad-Hoc and Sensor Networks (SASN 2003), pp. 21–32, October 2003
4.
go back to reference Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: ACM, WiSec 2009, Zurich, Switzerland, 16–18 March 2009 Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: ACM, WiSec 2009, Zurich, Switzerland, 16–18 March 2009
5.
go back to reference Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009) CrossRef Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009) CrossRef
6.
go back to reference Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings INFOCOM, pp. 107–115 (2007) Maheshwari, R., Gao, J., Das, S.R.: Detecting wormhole attacks in wireless networks using connectivity information. In: Proceedings INFOCOM, pp. 107–115 (2007)
7.
go back to reference Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 (2009) CrossRef Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 (2009) CrossRef
8.
go back to reference Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor networks with statistical analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010) Zhao, Z., Wei, B., Dong, X., Yao, L., Gao, F.: Detecting wormhole attacks in wireless sensor networks with statistical analysis. In: International Conference on Information Engineering (ICIE), pp. 251–254 (2010)
9.
go back to reference Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing, p. 6 (2006) Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing, p. 6 (2006)
10.
go back to reference Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–593 (2013) CrossRef Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 36(2), 582–593 (2013) CrossRef
11.
go back to reference Lai, G.H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016) CrossRef Lai, G.H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. 2016(1), 274 (2016) CrossRef
12.
go back to reference Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a wsn under wormhole attack. In: ACM, MSWiM 2007, Chaina, Greece, 22–26 October 2007 Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a wsn under wormhole attack. In: ACM, MSWiM 2007, Chaina, Greece, 22–26 October 2007
14.
go back to reference Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331–340, September 2007 Rasmussen, K.B., Capkun, S.: Implications of radio fingerprinting on the security of sensor networks. In: Third International Conference on Security and Privacy in Communication Networks and the Workshops, pp. 331–340, September 2007
15.
go back to reference Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004) Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004)
16.
go back to reference Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 13 (2016). Hindawi Publishing Corporation, Article ID 8354930 Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, 13 (2016). Hindawi Publishing Corporation, Article ID 8354930
17.
go back to reference Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. J. Ad Hoc Netw. 7(6), 1051–1063 (2008) CrossRef Madria, S., Yin, J.: SeRWA: a secure routing protocol against wormhole attacks in sensor networks. J. Ad Hoc Netw. 7(6), 1051–1063 (2008) CrossRef
18.
go back to reference Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009) Triki, B., Rekhis, S., Boudriga, N.: Digital investigation of wormhole attacks in wireless sensor networks. In: Eighth IEEE International Symposium on Network Computing and Applications, pp. 179–186 (2009)
19.
go back to reference Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(356382), 16 (2015). Article ID 356382 Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015(356382), 16 (2015). Article ID 356382
20.
go back to reference Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise–tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006) CrossRef Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise–tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 247–260 (2006) CrossRef
21.
go back to reference Dong, D., Liu, Y., Li, X. Y., Liao, X., Li, M.: Topological detection on wormholes in wireless ad hoc and sensor networks. In: 17th IEEE International Conference on Network Protocols, pp. 314–323 (2009) Dong, D., Liu, Y., Li, X. Y., Liao, X., Li, M.: Topological detection on wormholes in wireless ad hoc and sensor networks. In: 17th IEEE International Conference on Network Protocols, pp. 314–323 (2009)
22.
go back to reference Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: ACM, MobiHoc 2011, Paris, France 16–20 May 2011 Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: ACM, MobiHoc 2011, Paris, France 16–20 May 2011
23.
go back to reference Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer (2005) Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer (2005)
24.
go back to reference Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe 2004, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004) Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe 2004, Proceeding of the 2004 ACM Workshop on Wireless Security, pp. 51–60. ACM Press (2004)
25.
go back to reference Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 9 (2012). Article ID 145702 Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sensor Netw. 2012, 9 (2012). Article ID 145702
26.
go back to reference Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016, 15 (2016). Article ID 3405264 Mukherjee, S., Chattopadhyay, M., Chattopadhyay, S., Kar, P.: Wormhole detection based on ordinal MDS using RTT in wireless sensor network. J. Comput. Netw. Commun. 2016, 15 (2016). Article ID 3405264
27.
go back to reference Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems, pp. 1–6 (2014) Biswas, J., Gupta, A., Singh, D.: WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol. In: Proceedings of the 9th IEEE International Conference on Industrial and Information Systems, pp. 1–6 (2014)
28.
go back to reference Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13, 27–59 (2007) CrossRef Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw. 13, 27–59 (2007) CrossRef
29.
go back to reference Matam, R., Tripathy, S.: WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 180 (2013). Springer CrossRef Matam, R., Tripathy, S.: WRSR: wormhole-resistant secure routing for wireless mesh networks. EURASIP J. Wirel. Commun. Netw. 2013(1), 180 (2013). Springer CrossRef
30.
go back to reference Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., Economides, A.: EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, pp. 103–109 (2016) Tsitsiroudi, N., Sarigiannidis, P., Karapistoli, E., Economides, A.: EyeSim: a mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs. In: Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, pp. 103–109 (2016)
31.
go back to reference Chen, H., Chen, W., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014(1), 10 (2014) Chen, H., Chen, W., Wang, Z., Li, Y.: Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2014(1), 10 (2014)
Metadata
Title
Analysis of Wormhole Detection Features in Wireless Sensor Networks
Authors
Manish Patel
Akshai Aggarwal
Nirbhay Chaubey
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_3