Wormhole Attack Detection in Wireless Senor Networks

Authors

  • Harkesh Sehrawat  Department of CSE, UIET, MDU, Rohtak, Haryana, India
  • Yudhvir Singh  Department of CSE, UIET, MDU, Rohtak, Haryana, India

Keywords:

WSN, Wormhole Attack, AODV

Abstract

wireless sensor network is one of the recent trends in the field of networking. They have the capacity to work where it otherwise impossible for human beings. Wireless sensor network has extended the limits of human being with its usage in varied areas like military surveillance, medical etc. These networks consist of small nodes which can be placed anywhere in any type of environment. However these networks are vulnerable to certain attacks like black hole, wormhole and selective forwarding. Many authors have tried to tackle this attack by proposing various kinds of methods. In this paper wormhole attack, its impact on wireless sensor network is analyzed. A comprehensive study of various approach and their impact on the network is presented here.

References

  1. A. Tayebi, S. Berber, and A. Swain, "Wireless Sensor Network Attacks:An Overview and Critical Analysis," in Seventh International Conference on Sensing Technology Wireless, 2013, pp. 97-102.
  2. A. Boukerche, H. A. B. F. Oliveira, E. F. Nakamura, and A. A. F. Loureiro, "Secure Localization Algorithms for Wireless Sensor Networks," IEEE Commun. Mag., no. April, pp. 96-101, 2008.
  3. S. Zhang and H. Zhang, "A review of wireless sensor networks and its applications," 2012 IEEE Int. Conf. Autom. Logist., no. August, pp. 386-389, 2012.
  4. M. Islam and S. AshiqurRahman, "Anomaly intrusion detection system in wireless sensor networks: security threats and existing approaches," Int. J. Adv. Sci. Technol., vol. 36, pp. 1-8, 2011.
  5. K. Xing, R. S. S. Srinivasan, M. Rivera, J. Li, and X. Cheng, "Attacks and Countermeasures in Sensor Networks?: A Survey," in Network Security, S. C.-H. Huang, D. MacCallum, and D.-Z. Du, Eds. Boston, MA: Springer US, 2005, pp. 251-272.
  6. V. P. Singh, S. Jain, and J. Singhai, "Hello Flood Attack and its Countermeasures in Wireless Sensor Networks," Int. J. Comput. Sci. Issues, vol. 7, no. 3, pp. 23-27, 2010.
  7. A. Gupta and A. K. Gupta, "A Survey: Detection and Prevention of Wormhole Attack in Wireless Sensor Networks," vol. 14, no. 1, 2014.
  8. M. Studies, R. Gill, B. Road, and B. Road, "Sybil Attack Detection and Prevention Using AODV in," vol. 13, no. 7, 2013.
  9. S. Sharmila and G. Umamaheswari, "Detection of sinkhole attack in wireless sensor networks using message digest algorithms," in Proceedings of 2011 International Conference on Process Automation, Control and Computing, 2011, pp. 1-6.
  10. J. Brown and X. Du, "Detection of selective forwarding attacks in heterogeneous sensor networks," in IEEE International Conference on Communications, 2008, pp. 1583-1587.
  11. E. Fazeldehkordi, I. S. Amiri, and O. A. Akanbi, A Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. 2015.
  12. A. Habib, "Sensor Network Security Issues at Network Layer," in 2nd International Conference on Advance in Space Technologiees (ICAST 2008), 2008, pp. 58-63.
  13. T. Kavitha and D. Sridharan, "Security Vulnerabilities In Wireless Sensor Networks?: A Survey," J. Inf. Assur. Secur., vol. 5, pp. 31-44, 2010.
  14. D. Dong, M. Li, Y. Liu, and X. Liao, "WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks," in Proceedings of 2009 15th International Conference onParallel and Distributed Systems (ICPADS), 2009, pp. 72-79.
  15. L. Sharif and M. Ahmed, "The Wormhole Routing Attack in Wireless Sensor Networks (WSN)," J. Inf. Process. Syst., vol. 6, no. 2, pp. 177-184, 2010.
  16. M. Tiwari and J. Choudhary, "Study of Wormhole Attack in Wireless Sensor Networks," Int. J. Comput. Appl., vol. 5, no. 4, pp. 1-7, 2015.
  17. R. W. Anwar, M. Bakhtiari, H. Abdullah, and K. N. Qureshi, "Enhanced Trust Aware Routing against Wormhole Attacks in Wireless Sensor Networks," in International Conference on Smart Sensors and Application, 2015, pp. 56-59.
  18. R. El Kaissi, A. Kayssi, A. Chehab, and Z. Dawy, "DAWWSEN?: A Defense Mechanism against Wormhole Attacks in Wireless Sensor Networks," in Second International Conference on Innovations in Information Technology, 2005.
  19. A. A. Pirzada and C. Mcdonald, "Circumventing Sinkholes and Wormholes in Wireless Sensor Networks," in Proceedings of International Workshop on Wireless Ad-hoc Networks (IWWAN’05), 2005, vol. 71, no. May.
  20. N. Song, L. Qian, S. Ning, Q. Lijun, and L. Xiangfang, "Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach," Parallel Distrib. Process. Symp. 2005. Proceedings. 19th IEEE Int., p. 8 pp., 2005.
  21. Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," IEEE INFOCOM 2003. Twenty-second Annu. Jt. Conf. IEEE Comput. Commun. Soc. (IEEE Cat. No.03CH37428), vol. 3, no. C, pp. 1976-1986, 2003.
  22. L. Lazos, R. Poovendran, C. Meadows, P. Syverson, and L. W. Chang, "Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach," IEEE Wirel. Commun. Netw. Conf. 2005, vol. 2, pp. 1193-1199, 2005.
  23. D. Buch and D. Jinwala, "Prevention of Wormhole Attacks in Wireless Sensor Network," Ijnsa, vol. 3, no. 5, pp. 85-98, 2011.
  24. Z. T. and A. H. Maw., "Wormhole attack detection in wireless sensor networks," Proc. World Acad. Sci. Eng. Technol. Technol., vol. 46, no. 3, pp. 545-50, 2008.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Harkesh Sehrawat, Yudhvir Singh, " Wormhole Attack Detection in Wireless Senor Networks, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 2, pp.717-723, January-February-2018.