Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks

被引:6
作者
Chen, Honglong [1 ,2 ,3 ,4 ]
Chen, Wendong [5 ]
Wang, Zhibo [6 ]
Wang, Zhi [7 ]
Li, Yanjun [8 ]
机构
[1] China Univ Petr, Coll Informat & Control Engn, Qingdao 266580, Peoples R China
[2] Hong Kong Polytech Univ, Shenzhen 518057, Peoples R China
[3] Shenzhen Res Inst, Shenzhen 518057, Peoples R China
[4] Hong Kong Polytech Univ, Dept Comp, Kowloon 999077, Hong Kong, Peoples R China
[5] East China Jiaotong Univ, Sch Elect & Elect Engn, Nanchang 330013, Peoples R China
[6] Univ Tennessee, Dept Elect Engn & Comp Sci, Knoxville, TN 37934 USA
[7] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310027, Peoples R China
[8] Zhejiang Univ Technol, Coll Comp Sci & Technol, Hangzhou 310014, Zhejiang, Peoples R China
关键词
Computer crime;
D O I
10.1155/2014/910242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wormhole attack is a severe attack that can be easily launched by a pair of external attackers in hostile wireless sensor networks. In the wormhole attack, an attacker sniffs packets at one point in the network, and tunnels them through the wormhole link to the other attacker at another point of the network, which broadcasts them to its neighbors. Such kind of procedure can easily deteriorate the normal functionality of the networks. In this paper, we propose a novel wormhole attackers detection and positioning scheme based on mobile beacon, which can not only detect the existence of wormhole attacks, but also accurately localize the attackers for the system to eliminate them out of the network. The main idea is to detect whether the communication between the mobile beacon and each of the static beacons violates the communication properties and then the attacker can be estimated as the center of its communication area by determining the intersection point of the chords perpendicular bisector. The simulation results illustrate that our proposed scheme can obtain a high wormhole attack detection probability as well as a high attackers positioning accuracy.
引用
收藏
页数:10
相关论文
共 18 条
[1]   Local Connectivity Tests to Identify Wormholes in Wireless Networks [J].
Ban, Xiaomeng ;
Sarkar, Rik ;
Gao, Jie .
PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING (MOBIHOC' 11), 2011,
[2]   Secure positioning in wireless networks [J].
Capkun, S ;
Hubaux, JP .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :221-232
[3]  
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[4]  
Chen H., 2014, PERVASIVE MOBILE COM
[5]  
Chen H., 2014, WIRELESS COMMUNICATI
[6]   Secure Localization Against Wormhole Attacks Using Conflicting Sets [J].
Chen, Honglong ;
Lou, Wei ;
Wang, Zhi .
2010 IEEE 29TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2010, :25-33
[7]  
Dimitriou T., 2010, P IEEE INT C DISTR C
[8]   Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks [J].
Dong, Dezun ;
Li, Mo ;
Liu, Yunhao ;
Li, Xiang-Yang ;
Liao, Xiangke .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (06) :1787-1796
[9]  
Eriksson Jakob, 2006, 2006 14th IEEE International Conference on Network Protocols, P75
[10]  
Hu Y.-C., 2003, WiSe '03, P30, DOI 10.1145/941311.941317