CFP last date
22 April 2024
Reseach Article

A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks

by Marcus Okunlola Johnson, Arish Siddiqui, Amin Karami
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 4
Year of Publication: 2017
Authors: Marcus Okunlola Johnson, Arish Siddiqui, Amin Karami
10.5120/ijca2017915376

Marcus Okunlola Johnson, Arish Siddiqui, Amin Karami . A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks. International Journal of Computer Applications. 174, 4 ( Sep 2017), 1-8. DOI=10.5120/ijca2017915376

@article{ 10.5120/ijca2017915376,
author = { Marcus Okunlola Johnson, Arish Siddiqui, Amin Karami },
title = { A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2017 },
volume = { 174 },
number = { 4 },
month = { Sep },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number4/28392-2017915376/ },
doi = { 10.5120/ijca2017915376 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:21:13.653933+05:30
%A Marcus Okunlola Johnson
%A Arish Siddiqui
%A Amin Karami
%T A Wormhole Attack Detection and Prevention Technique in Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 4
%P 1-8
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Security is one of the major and important issues surrounding network sensors because of its inherent liabilities, i.e. physical size. Since network sensors have no routers, all nodes involved in the network must share the same routing protocol to assist each other for the transmission of packets. Also, its unguided nature in dynamic topology makes it vulnerable to all kinds of security attack, thereby posing a degree of security challenges. Wormhole is a prominent example of attacks that poses the greatest threat because of its difficulty in detecting and preventing. In this paper, we proposed a wormhole attach detection and prevention mechanism incorporated AODV routing protocol, using neighbour discovery and path verification mechanism. As compared to some preexisting methods, the proposed approach is effective and promising based on applied performance metrics.

References
  1. Ravinder Ahuja, Alisha Banga Ahuja, and Pawan Ahuja. Performance evaluation and comparison of aodv and dsr routing protocols in manets under wormhole attack. In Image Information Processing (ICIIP), pages 699 – 702, 2013.
  2. Parmar Amish and V.B. Vaghela. Detection and prevention of wormhole attack in wireless sensor network using aomdv protocol. Procedia Computer Science, 79:700 – 707, 2016.
  3. Swati Bhagat and Trishna Panse. A detection and prevention of wormhole attack in homogeneous wireless sensor network. In International Conference on ICT in Business Industry Government (ICTBIG), pages 1 – 6, 2016.
  4. J. Biswas, A. Gupta, and D. Singh.Wadp: A wormhole attack detection and prevention technique in manet using modified aodv routing protocol. In 9th International Conference on Industrial and Information Systems (ICIIS), pages 1 – 6, 2014.
  5. Avinash S. Bundela. Literature survey on wormhole attack. International Journal of Engineering Sciences & Research Technology, 4(6):41 – 48, 2015.
  6. Srdjan Capkun, Levente Buttyan, and Jean-Pierre Hubaux. Sector: Secure traking of node encouters in multi-hop wireless networks. In Proceedings of 1st ACM Workshop on Security of Ad hoc and Sensor Networks (ACM SANS), pages 21 – 32, 2003.
  7. S. Choi, D. y. Kim, D. h. Lee, and J. i. Jung. Wap: Wormhole attack prevention algorithm in mobile ad hoc networks. In IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008), pages 343 – 348, 2008.
  8. Saurabh Ganeriwal, Ram Kumar, and Mani B. Srivastava. Timing-sync protocol for sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems. ACM, pages 138 – 149, 2003.
  9. Gaurav Garg, Sakshi Kaushal, and Akashdeep Sharma. Reactive protocols analysis with wormhole attack in ad-hoc networks. In Computing, Communication and Networking Technologies (ICCCNT), pages 1 – 7, 2014.
  10. M. P. Gulwade, K. J. Dhoot, A. I. Bajaj, and M. M. Ghonge. Effectiveness of wormhole attack on dsr protocol in manet. World Research Journal of Telecommunications Systems, 1(1):13 – 15, 2012.
  11. Lingxuan Hu and David Evans. Using directional antennas to prevent wormhole attacks. In NDSS, 2004.
  12. Y. C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: a defense against wormhole attacks in wireless networks. In Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), volume 3, pages 1976 – 1986, 2003.
  13. Amin Karami. A framework for uncertainty-aware visual analytics in big data. In Proceedings of the 3rd International Workshop on Artificial Intelligence and Cognition (AIC 2015), volume 1510, pages 146 – 155. CEUR-WS, 2015.
  14. Amin Karami and Manel Guerrero-Zapata. Mining and visualizing uncertain data objects and named data networking traffics by fuzzy self-organizing map. In Proceedings of the 2nd International Workshop on Artificial Intelligence and Cognition (AIC 2014), volume 1315, pages 156 – 163. CEURWS, 2014.
  15. Amin Karami and Manel Guerrero-Zapata. An anfis-based cache replacement method for mitigating cache pollution attacks in named data networking. Computer Networks, 80:51 – 65, 2015.
  16. Amin Karami and Manel Guerrero-Zapata. A fuzzy anomaly detection system based on hybrid pso-kmeans algorithm in content-centric networks. Neurocomputing, 149(Part C):1253 – 1269, 2015.
  17. Amin Karami and Manel Guerrero-Zapata. A hybrid multiobjective rbf-pso method for mitigating dos attacks in named data networking. Neurocomputing, 151(Part 3):1262 – 1282, 2015.
  18. I. Khalil, Saurabh Bagchi, and N. B. Shroff. Liteworp: a lightweight countermeasure for the wormhole attack in multihop wireless networks. In International Conference on Dependable Systems and Networks (DSN’05), pages 612 – 621, 2005.
  19. Pravin Khandare and N. P. Kulkarni. Public key encryption and 2ack based approach to defend wormhole attack. India International Journal Of Computer Trends And Technology, 4(3):247 – 252, 2013.
  20. A. Malhotra, D. Bhardwaj, and A. Garg. Wormhole attack prevention using clustering and digital signatures in reactive routing. In Proceedings of 9th IEEE International Conference on Networking, Sensing and Control, pages 122 – 126, 2012.
  21. Sergio Marti, Thomas J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 255 – 265, 2000.
  22. P. Sharma and A. Trivedi. An approach to defend against wormhole attack in ad hoc network using digital signature. In IEEE 3rd International Conference on Communication Software and Networks, pages 307 – 311, 2011.
  23. Sejun Song, Haijie Wu, and Baek-Young Choi. Statistical wormhole detection for mobile sensor networks. In Fourth International Conference on Ubiquitous and Future Networks (ICUFN), pages 322 – 327, 2012.
  24. Andreas Tonnesen. Reactive rotocols - AODV, 2004. http: //www.olsr.org/docs/report_html/node16.html, accessed at 2017-05-20.
  25. Saurabh Upadhyay and Brijesh Kumar Chaurasia. Impact of wormhole attacks on manets. In International Journal of Computer Science & Emerging Technologies, pages 77 – 82, 2011.
  26. Guowei Wu, Xiaojie Chen, Lin Yao, Youngjun Lee, and Kangbin Yim. An efficient wormhole attack detection method in wireless sensor networks. Computer Science and Information Systems, 11(3):1127 – 1141, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Sensor Networks Wormhole Attack AODV routing