WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

被引:29
作者
Singh, Rupinder [1 ]
Singh, Jatinder [1 ]
Singh, Ravinder [1 ]
机构
[1] IKG Punjab Tech Univ, Kapurthala, Punjab, India
关键词
MISBEHAVIOR;
D O I
10.1155/2016/8354930
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wormhole attack is a challenging security threat to wireless sensor networks which results in disrupting most of the routing protocols as this attack can be triggered in different modes. In this paper, WRHT, a wormhole resistant hybrid technique, is proposed, which can detect the presence of wormhole attack in a more optimistic manner than earlier techniques. WRHT is based on the concept of watchdog and Delphi schemes and ensures that the wormhole will not be left untreated in the sensor network. WRHT makes use of the dual wormhole detection mechanism of calculating probability factor time delay probability and packet loss probability of the established path in order to find the value of wormhole presence probability. The nodes in the path are given different ranking and subsequently colors according to their behavior. The most striking feature of WRHT consists of its capacity to defend against almost all categories of wormhole attacks without depending on any required additional hardware such as global positioning system, timing information or synchronized clocks, and traditional cryptographic schemes demanding high computational needs. The experimental results clearly indicate that the proposed technique has significant improvement over the existing wormhole attack detection techniques.
引用
收藏
页数:13
相关论文
共 41 条
[1]  
[Anonymous], P NETW DISTR SYST SE
[2]  
[Anonymous], P INF THEOR APPL WOR
[3]  
[Anonymous], 2011, J COMPUTATIONAL INFO
[4]  
[Anonymous], P IEEE 1 INT S WIR P
[5]  
[Anonymous], P 19 IEEE INT PAR DI
[6]  
Awerbuch B, 2008, ACM T INFORM SYST SE, V10, DOI [10.1145/1284680.1284686, 10.1145/1284680.1341892]
[7]  
Biswas Juhi, 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS), P1, DOI 10.1109/ICIINFS.2014.7036535
[8]   An asynchronous neighbor discovery algorithm for wireless sensor networks [J].
Borbash, Steven A. ;
Ephremides, Anthony ;
McGlynn, Michael J. .
AD HOC NETWORKS, 2007, 5 (07) :998-1016
[9]  
Buttyán L, 2005, LECT NOTES COMPUT SC, V3813, P128
[10]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21