Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks

Derek Mohammed, Marwan Omar, Van Nguyen

Abstract


This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complications arising from a specific type of security breach, the wormhole attack. Wormhole attacks against WSNs are classified as passive, external laptop-class threats. Because malicious wormhole attacks are increasing, these attacks pose a serious security threat and increase the costs to maintain a Wireless Sensor Network. Research into preventing wormhole attacks yields two distinct model approach types: Administrator-Viewpoint models and User-Viewpoint models. While the modalities vary, the four Administrator-Viewpoint models reviewed were designed in the early 2000s and suggest defending against wormhole attacks through the use of expensive hardware, packet leashes, or topology visualization systems. On the other hand, the four proposed User-Viewpoint models have become the current theoretical models of choice.  While existing as simulation approaches to defend against wormhole attacks, the User-Viewpoint models use internally calculated routing algorithms to suggest routes to avoid or evade, not defend against, established wormhole routes. This paper confirms the efficacies of the User-Viewpoint models in the lab simulations are viewed as the most promising cost-effective, future security solutions to wormhole attacks.

Keywords


Wireless Sensor Networks; Wormholes; Security; Sensor nodes

Full Text:

PDF

References


Bankovic, Z., Fraga, D., Moya, J., & Vallejo, J. C. (2012). Detecting unknown attacks in wireless sensor networks that contain mobile nodes. Sensors, 12(8).

He, R., Ma, G., Wang, C., & Fang, L. (2009). Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes. World Academy of Science, Engineering and Technology, 55.

Honglong, C., Wei, L., Xice, S., & Zhi, W. (2010). A secure localization approach against wormhole attacks using distance consistency. EURASIP Journal on Wireless Communications and Networking, 2010, 1-11.

Hu, Y., Perring, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Proceedings of 22nd Annual Conference of the IEEE Computer and Communication Societies, 3, pp. 1976-1986.

Jagadeesan, S. (2016). Wireless sensor network security. Proceedings of 3rd International Conference on Recent Innovations in Science, Technology, Management and Environment, 16, pp. 202-209.

Jha, M. K., & Sharma, T. P. (2010). A new approach to secure data aggregation protocol for wireless sensor network. International Journal on Computer Science & Engineering, 1(5), 1539-1543.

Kumar, K., Waheed, M., & Basappa, K. (2010, October). TCPL: A defense against wormhole attacks in wireless sensor networks. Paper presented at AIP Conference Proceedings, Ipswich, United Kingdom.

Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. Proceedings of Wireless Communications and Networking Conference, 2005 IEEE, pp. 1193-1199.

Mahadevi, G. (2011). Location discovery with security in wireless sensor networks. International Journal on Computer Science & Engineering, 3(4), 1528-1533.

Meghdadi, M., Ozdemir, S., & Guler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Technical Review, 28(2), 89-102.

Qiu, Y., Zhou, J., Baek, J., & Lopez, J. (2010). Authentication and key establishment in dynamic wireless sensor networks. Sensors, 10(4), 3718-3731.

Rahman, M., & El-Khatib, K. (2009). Secure anonymous communication for wireless sensor networks based on pairing over elliptic curves. Journal of Interconnection Networks, 10(4), 459-479.

Rani, A. & Kumar, S. (2017). A survey of security in wireless sensor networks. Proceedings of 3rd International Conference on Computational Intelligence & Communication Technology, 8, 256-260.

Shabana, K., Fida, N., Khan, F., Jan, S.R., & Rehman, M. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering, 5(7), 81-87.

Shang-Ming, J., Chi-Sung, L., & Wen-Chung, K. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022-5039.

Sharma, P., & Bhadana, P. (2010). An effective approach for providing anonymity in wireless sensor network: Detecting attacks and security measures. International Journal on Computer Science & Engineering, 1(5), 1830-1835.

Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. Proceedings of World Academy of Science Engineering and Technology, 46, pp. 545-550.

Wang, W., & Bhargava, B. (2004). Visualization of wormholes in sensor networks. In Proceedings of the 2004 ACM Workshop on Wireless Security (pp. 51-60). Philadelphia, PA: ACM WiSE'04.


Refbacks

  • There are currently no refbacks.


 

Copyright© 2015 Journal of Research in Business, Economics and Management. All rights reserved.

ISSN 2395-2210

For any help/support contact us at editorial@scitecresearch.com, jrbem@scitecresearch.com.