A wormhole attack detection method for tactical wireless sensor networks

被引:2
作者
Zhang, Ke [1 ]
机构
[1] JiuZhou Polytech, Acad Affairs Off, Xuzhou, Peoples R China
关键词
Tactical network; WSN; Passive attack; Wormhole; QoS; Protocols; Intrusion; Secure routing and neighbor monitoring;
D O I
10.7717/peerj-cs.1449
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors' data communication around the tactical networks. Therefore, this work proposes a Quality of Service (QoS) security mechanism to select multiple dual-layer guard nodes at different paths of the WSN based on the path qualities to detect wormholes. The entire network's links are categorized into high, normal, and low priority levels. As such, this study aimed to confirm the security of high priority nodes and links in the tactical network, avoid excessive overhead, and provide random security facilities to all nodes. The proposed measures of the QoS-based security provision, including link cluster formation, guard node selection, authenticated guard node identification, and intrusion detection, ensure economic and efficient network communication with different quality levels.
引用
收藏
页数:16
相关论文
共 17 条
  • [1] [Anonymous], 2008, WORLD ACAD SCI ENG T
  • [2] Operating systems and network protocols for wireless sensor networks
    Dutta, Prabal
    Dunkels, Adam
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2012, 370 (1958): : 68 - 84
  • [3] An Integrated Pricing, QoS-Aware Sensor Location Model for Security Protection in Society 5.0
    Fathi, Mahdi
    Marufuzzaman, Mohammad
    Buchanan, Randy K.
    Rinaudo, Christina H.
    Houte, Kayla M.
    Bian, Linkan
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2023, 70 (11) : 3863 - 3875
  • [4] Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
    Ji, Shiyu
    Chen, Tingting
    Zhong, Sheng
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2015, 14 (03) : 660 - 674
  • [5] LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
    Kaliyar, Pallavi
    Ben Jaballah, Wafa
    Conti, Mauro
    Lal, Chhagan
    [J]. COMPUTERS & SECURITY, 2020, 94
  • [6] Karthigadevi K., 2018, Journal of Cyber Security and Mobility, V7, P215, DOI 10.13052/2245-1439.7115
  • [7] Khan SU, 2012, GLOBAL J COMPUTER SC, V12, P16
  • [8] Kumhar M, 2015, International Journal of Computer Science & Communication, V6, P121
  • [9] Kurmi J, 2017, Advances in Computational Sciences and Technology, V10, P1129
  • [10] Lakshmi TV, 2019, International Journal of Advanced Research in Computer and Communication Engineering, V4, P480