Scalable and Distributed Detection Anaysis on Wormhole Links in Wireless Sensor Networks for Networked Systems

被引:15
作者
Padmanabhan, Jayashree [1 ]
Manickavasagam, Venkatesh [2 ]
机构
[1] Anna Univ, Dept Comp Technol, Madras Inst Technol Campus, Madras 600044, Tamil Nadu, India
[2] Google Inc, San Francisco, CA 94105 USA
关键词
Cyber physical systems; networked control systems; security; sequential analysis; wireless sensor networks; wormhole attacks; ATTACK DETECTION;
D O I
10.1109/ACCESS.2017.2780188
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent surge in cyber physical systems (CPSs) which integrate cyber and physical worlds, increases security risks at both the surfaces. The wireless sensor communication network is one of the major components of the critical infrastructure in all networked systems including networked control systems and CPSs. As these systems support range of time and data sensitive applications, varying from health care to emergency services, to transport, and to environmental monitoring services, core sensor network component faces potential threats due to varying attacks, including wormhole attack that can cause damage to the control system in terms of data leakage, data dropping, and delayed delivery. It is also difficult to detect, as it requires neither nodes in the network to be compromised nor adversaries to acquire valid network identity to instigate such attacks. Many existing solutions in the literature to detect wormholes are based on node's static location information, synchronization of clocks, use of additional hardware, such as antennas and GPS, and neighborhood and traffic information, which may lead to large energy consumption. In this paper, a scalable and distributed scheme which uses sequential probability ratio test is proposed, to avoid single point failures and to handle high mobility, with no additional resource requirements. It is observed that wormholes are detected using few packets and detection is faster with increasing mobility. The system is highly customizable as system parameters can be chosen to balance the speed and accuracy of detection. System overheads in terms of communication, computation, and storage aspects are analyzed and presented.
引用
收藏
页码:1753 / 1763
页数:11
相关论文
共 30 条
[1]   Detection and Prevention of Wormhole Attack in Wireless Sensor Network using AOMDV protocol [J].
Amish, Parmar ;
Vaghela, V. B. .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :700-707
[2]   Reliability Improvement of Multi-Path Routing for Wireless Sensor Networks and Its Application to Wormhole Attack Avoidance [J].
Arai, Masayuki .
IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, :533-536
[3]   JITWORM: Jitter Monitoring Based Wormhole Attack Detection in MANET [J].
Bagade, Sudhir ;
Raisinghani, Vijay .
INFORMATION SYSTEMS SECURITY, 2016, 10063 :444-458
[4]  
Biswas Juhi, 2014, 2014 9th International Conference on Industrial and Information Systems (ICIIS), P1, DOI 10.1109/ICIINFS.2014.7036535
[5]   On providing wormhole-attack-resistant localization using conflicting sets [J].
Chen, Honglong ;
Lou, Wei ;
Wang, Zhi .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2015, 15 (15) :1865-1881
[6]   Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks [J].
Chen, Honglong ;
Chen, Wendong ;
Wang, Zhibo ;
Wang, Zhi ;
Li, Yanjun .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2014,
[7]  
Dhurandher S. K., 2012, P AINA, P422
[8]  
Eidie S., 2015, PROC IKT URM IR, P1
[9]   LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks [J].
Giannetsos, Thanassis ;
Dimitriou, Tassos .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (03) :618-643
[10]   Internet of Things (IoT): A vision, architectural elements, and future directions [J].
Gubbi, Jayavardhana ;
Buyya, Rajkumar ;
Marusic, Slaven ;
Palaniswami, Marimuthu .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07) :1645-1660