DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS

Publications

Share / Export Citation / Email / Print / Text size:

International Journal on Smart Sensing and Intelligent Systems

Professor Subhas Chandra Mukhopadhyay

Exeley Inc. (New York)

Subject: Computational Science & Engineering , Engineering, Electrical & Electronic

GET ALERTS

eISSN: 1178-5608

DESCRIPTION

3
Reader(s)
3
Visit(s)
0
Comment(s)
0
Share(s)

VOLUME 6 , ISSUE 1 (February 2013) > List of articles

DETECTING WORMHOLE ATTACKS IN WIRELESS SENSOR NETWORKS USING HOP COUNT ANALYSIS

Lan Yao * / Zhibin Zhao * / Ge Yu *

Keywords : wireless sensor networks, wormhole attack, hop count, neighborhood validation.

Citation Information : International Journal on Smart Sensing and Intelligent Systems. Volume 6, Issue 1, Pages 209-223, DOI: https://doi.org/10.21307/ijssis-2017-537

License : (CC BY-NC-ND 4.0)

Received Date : 05-November-2012 / Accepted: 20-January-2013 / Published Online: 20-February-2013

ARTICLE

ABSTRACT

The wormhole attack is a severe threat to wireless sensor networks. Most existing countermeasures for detecting and locating wormhole links either require extra hardware or are too complex for the inherently capability-constrained sensor nodes. Actually, wormhole links can enormously change the original sensor network topology. In this paper, we introduce the HCA4DW mechanism for detecting and locating wormholes in wireless sensor networks. It is based on the basic idea that the change of topology can be detected through neighborhood validation. We discover the maximum necessary hop count between the sensors in the same neighbor set for neighborhood validation. We describe the detail procedure of HCA4DW in this paper and test the performance of the HCA4DW mechanism rigorously through simulative experiments.

Content not available PDF Share

FIGURES & TABLES

REFERENCES

[1] J. Agre, L. Clare, “An integrated architecture for cooperative sensing networks”, IEEE Computer, Vol 33, No. 5, 2000, pp. 106-108.
[2] D. Estrin, R. Govindan, J. Heideman and S. Kumar., “Next century challenges: Scalable Coordination in Sensor Networks”, Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp.263-270, USA, 1999.
[3] Kewei Sha, Junzhao Du, Weisong Shi, “WEAR: a balanced, fault-tolerant, energy-aware routing protocol in WSNs”, International Journal of Sensor Networks, Vol 1, No. 3/4, 2006, pp.156-168.
[4] Habib M.Ammari, Sajal K. Das, “A trade-off between energy and delay in data dessemination for wireless sensor networks using transmision range slicing”, Computer Communications, Vol 31, No. 9, 2008, pp.1687-1704.
[5] Karlof C, David Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures”, Ad Hoc Networks, Vol 1, No. 2/3, 2003, pp. 293-315.
[6] Y.-C. Hu, A. Perrig, D. B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless networks”, Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1976-1986, USA, March 30 - April 3, 2003.
[7] L.X. Hu and D Evans, “Using directional antennas to prevent wormhole attacks”, Proceedings of Network and Distributed System Security Symposium, USA, February 5-6, 2004.
[8] Perrig, Adrian, Trappe, Wade, Gligor, Virgil and Poovendran Radha, “Secure wireless networking” Journal of Communications and Networks, Vol 13, No. 1, 2007, pp. 323-327.
[9] S. Choi and D.Y. Kim, D. H. Lee, J.I. Jung, “WAP: Wormhole attack prevention algorithm in mobile Ad Hoc networks”, Proceedings of 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 3434-348, USA, June 11-13, 2008.
[10] S. Madria, J. Yin, “SeRWA: A secure routing protocol against wormhole attacks in sensor networks”, Ad Hoc Networks, Vol. 7, No. 6, 2009, pp. 1051-1063.
[11] G. Lee , D. K. Kim, J. Seo, “An approach to mitigate wormhole attack in wireless Ad Hoc networks”, Proceedings of 2008 International Conference on Information Security and Assurance, pp. 220-225, Korea, April 24-26, 2009.
[12] J Zhu, KL Hung, B Bensaou, F Nait-Abdesselam, “Rate-lifetime tradeoff for reliable communication in wireless sensor networks”, Computer Networks, Vol. 52, No. 1, 2007, pp. 25-43.
[13] A. Rasheed and R. Mahapatra, “Mobile sink using multiple channels to defend against wormhole attacks in wireless sensor networks”, Proceedings of the 28th IEEE International Performance Computing and Communications Conference, pp..216-222, USA, December 14-16, 2009.
[14] R. Maheshwari and J. Gao, S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information”, Proceedings of the 26th IEEE International Conference on Computer Communications, pp. 105-115, USA, May 6-12, 2007.
[15] T. Hayajneh and P. Krishnamurthy, D. Tipper, “DeWorm: a simple protocol to detect wormhole attacks in wireless Ad hoc networks”, Proceedings of the Third International Conference on Network and System Security, pp. 73-80, Australia, October 19-21, 2009.
[16] D. Z. Dong and M. Li, Y. H. Liu, X. Y. Li, X. K. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks”, IEEE/ACM Transactions on Networking, Vol 19, No. 6, 2011, pp. 1787-1796.
[17] S. M. Jen and C. S. Laih, W. C. Kuo, “A hop-count analysis scheme for avoiding wormhole attacks in MANET”, Sensors, Vol 19, No. 6, 2009, pp. 5022-5039.
[18] L. J. Qian and N. Song, X. F. Li, “Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach”, Journal of Network and Computer Applications, Vol 30, 2007, pp. 308-330.
[19] A. Hatcher, “Algebraic topology”, Cambridge University Press, Cambridge, 2002.
[20] S. J. Lee and M. Gerla, “Split multipath routing with maximally disjoint paths in Ad hoc networks”, Proceedings of IEEE International Conference on Communications, pp. 3201-3205, Finland, June 11-14, 2001.

EXTRA FILES

COMMENTS