Detection of wormhole attacks in mobility-based wireless sensor networks

被引:6
作者
Patel, Manish [1 ]
Aggarwal, Akshai [2 ]
Chaubey, Nirbhay K. [3 ]
机构
[1] Gujarat Technol Univ, Smt SR Patel Engn Coll, Unjha, Gujarat, India
[2] Univ Windsor, Sch Comp Sci, Windsor, ON, Canada
[3] Gujarat Technol Univ, SS Agrawal Inst Comp Sci, Unjha, Gujarat, India
关键词
wireless sensor network; mobility; wormhole; malicious; detection accuracy;
D O I
10.1504/IJCNDS.2018.10014500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) have many limitations in terms of their computational capability, memory, and battery power. In addition, the sensor nodes use insecure wireless communication channels. Thus, WSNs are vulnerable to many types of attacks such as jamming, sinkhole, wormhole, Sybil, and selective forwarding. Among all these attacks, detecting a wormhole attack is very difficult in mobility-based WSNs. In these WSNs, two genuine nodes that are located far apart can become one-hop neighbours for valid reasons. However, the same scenario might indicate the presence of a wormhole attack instead. Differentiating genuine nodes from malicious nodes is a highly challenging task. Our detection method is based on the concept of the rate of change of neighbouring nodes and the length of an alternative path between two nodes. The proposed method does not require any additional hardware such as synchronised clocks or timing information, GPS, or cryptographic methods that require large amounts of computational power. The simulation results indicate that our method has good detection accuracy.
引用
收藏
页码:147 / 156
页数:10
相关论文
共 31 条
[1]  
Anwar R.W., 2015, INT C SMART SENS APP
[2]  
Biswas Juhi, 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS), P1, DOI 10.1109/ICIINFS.2014.7036535
[3]   Network security: distributed intrusion detection system using mobile agent technology [J].
Boukhlouf, Djemaa ;
Kazar, Okba ;
Kahloul, Laid .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2016, 17 (04) :335-347
[4]   A secure and effective access control scheme for distributed wireless sensor networks [J].
Chatterjee, Santanu ;
Das, Ashok Kumar ;
Sing, Jamuna Kanta .
INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (01) :40-73
[5]  
Chiu H. S., 2006, P IEEE 1 INT S WIR P, P1
[7]  
Dhurandher Sanjay K., 2008, 2008 3rd International Conference on Systems and Networks Communications, P197, DOI 10.1109/ICSNC.2008.62
[8]  
Hai T.H., 2009, WIRELESS COMMUNICATI, V10, P559
[9]   Analysis of Detection Features for Wormhole Attacks in MANETs [J].
Imran, Muhammad ;
Khan, Farrukh Aslam ;
Jamal, Tauseef ;
Durad, Muhammad Hanif .
10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 :384-390
[10]   Wormhole Attack Detection Algorithms in Wireless Network Coding Systems [J].
Ji, Shiyu ;
Chen, Tingting ;
Zhong, Sheng .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (03) :660-674