Centralized Routing Protocol for Detecting Wormhole Attacks in Wireless Sensor Networks

被引:35
作者
Ahutu, Ohida Rufai [1 ]
El-Ocla, Hosam [1 ]
机构
[1] Lakehead Univ, Dept Comp Sci, Thunder Bay, ON P7B 5E1, Canada
关键词
Wireless sensor networks; Routing; Routing protocols; Energy consumption; Security; IEEE; 802; 15; Standard; Wireless; sensor; networks; MAC; routing; wormhole; attack; centralized; energy; consumption; 4; AD HOC NETWORKS; ALGORITHM;
D O I
10.1109/ACCESS.2020.2983438
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nodes in wireless sensor networks (WSN) are resource and energy-constrained because they are generally batteries powered and therefore have limited computational capability. Due to the less secure environment in WSN, some malicious nodes at one point can tunnel packets to another location to damage the network in terms of packets dropping and eavesdropping and this is a so-called wormhole attack. Many of the current protocols solve the wormhole attack problem in isolation from the node energy consumption. However, some other proposed solutions consider reducing the energy consumption to detect such attacks but still it is needed to probe better performance. In this paper, we present a lightweight multi-hop routing protocol for 802.15.4 WSN that aims to minimize the energy consumption and also to detect the wormhole attacks. Simulation results prove that our MAC Centralized Routing Protocol (MCRP) outperforms other existing similar protocols.
引用
收藏
页码:63270 / 63282
页数:13
相关论文
共 47 条
[1]   Wormhole-Free Routing and DoS Attack Defense in Wireless Mesh Networks [J].
Akilarasu, G. ;
Shalinie, S. Mercy .
WIRELESS NETWORKS, 2017, 23 (06) :1709-1718
[2]   Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks [J].
Aliady, Wateen A. ;
Al-Ahmadi, Saad A. .
IEEE ACCESS, 2019, 7 :84132-84141
[3]   Detecting wormhole attacks in 3D wireless ad hoc networks via 3D forbidden substructures [J].
Bai, Sen ;
Liu, Yunhao ;
Li, Zhenhua ;
Bai, Xin .
COMPUTER NETWORKS, 2019, 150 :190-200
[4]  
Birajdar DM, 2017, PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), P465
[5]  
Ditzel M, 2005, EURO WIREL TECHNOL C, P185
[6]   Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks [J].
Dong, Dezun ;
Li, Mo ;
Liu, Yunhao ;
Li, Xiang-Yang ;
Liao, Xiangke .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) :1787-1796
[7]   Joint Optimal Placement, Routing, and Flow Assignment in Wireless Sensor Networks for Structural Health Monitoring [J].
Elsersy, Mohamed ;
Elfouly, Tarek Mohamed ;
Ahmed, Mohamed Hossam .
IEEE SENSORS JOURNAL, 2016, 16 (12) :5095-5106
[8]   Improving the Performance of Wireless Sensor Networks Through Optimized Complex Field Network Coding [J].
Eritmen, Kayhan ;
Keskinoz, Mehmet .
IEEE SENSORS JOURNAL, 2015, 15 (05) :2934-2946
[9]   Graph-Based Energy Supportive Routing Protocol to Resist Wormhole Attack in Mobile Adhoc Network [J].
Geetha, S. B. ;
Patil, Venkanagouda C. .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (01) :859-880
[10]   LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks [J].
Giannetsos, Thanassis ;
Dimitriou, Tassos .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :618-643