CFP last date
20 May 2024
Reseach Article

An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode

by Parminder Singh, Damandeep Kaur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 73 - Number 20
Year of Publication: 2013
Authors: Parminder Singh, Damandeep Kaur
10.5120/13011-0309

Parminder Singh, Damandeep Kaur . An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode. International Journal of Computer Applications. 73, 20 ( July 2013), 26-29. DOI=10.5120/13011-0309

@article{ 10.5120/13011-0309,
author = { Parminder Singh, Damandeep Kaur },
title = { An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 73 },
number = { 20 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 26-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume73/number20/13011-0309/ },
doi = { 10.5120/13011-0309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:40:39.639409+05:30
%A Parminder Singh
%A Damandeep Kaur
%T An Approach to Improve the Performance of WSN during Wormhole Attack using Promiscuous Mode
%J International Journal of Computer Applications
%@ 0975-8887
%V 73
%N 20
%P 26-29
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to dynamic topology and non-wired infrastructure of Wireless Sensor Networks (WSN), they are prone to attacks. Wormhole attack is one of the most popular and serious attack in WSNs. In Wormhole attack two or more malicious nodes makes a covert channel which attracts the traffic towards itself by depicting a low latency link and then start dropping and replaying packets in the multi-path route. This paper proposes promiscuous mode method to detect and isolate the malicious node during wormhole attack by using Ad-hoc on demand distance vector routing protocol (AODV) with omnidirectional antenna. This paper proposes that the nodes which are not participating in multi-path routing generates an alarm message during delay and then detects and isolate the malicious node from network.

References
  1. S. L. Malfa, "Wireless sensor networks," 2010.
  2. M. Singh and R. Das, "A survey of different techniques for detection of wormhole attack in wireless sensor network. "
  3. H. S. Chiu and K. -S. Lui, "Delphi: wormhole detection mechanism for ad hoc wireless networks," in Wireless Pervasive Computing, 2006 1st International Symposium on. IEEE, 2006, pp. 6–pp.
  4. F. Na¨ýt-Abdesselam, "Detecting and avoiding wormhole attacks in wireless ad hoc networks," vol. 46, no. 4. IEEE, 2008, pp. 127–133
  5. M. S. Sankaran, S. Poddar, P. S. Das, and S. Selvakumar, "A novel security model saw: Security against wormhole attack in wireless sensor networks," in Proceedings of International Conference on PDCN, 2009.
  6. K. S. Win, "Analysis of detecting wormhole attack in wireless networks," vol. 48, 2008, pp. 422–428.
  7. H. Singh and G. S. Josan, "Performance analysis of aodv & dsr routing protocols in wireless sensor networks," 2012.
  8. E. M. Royer and C. E. Perkins, "Multicast operation of the ad-hoc on-demand distance vector routing protocol," in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM, 1999, pp. 207–218.
  9. D. B. Johnson, D. A. Maltz, J. Broch et al. , "Dsr: The dynamic source routing protocol for multi-hop wireless ad hoc networks," vol. 5, 2001, pp. 139–172.
  10. H. Chen, W. Lou, X. Sun, and Z. Wang, "A secure localization approach against wormhole attacks using distance consistency," vol. 2010. Hindawi Publishing Corp. , 2010, p. 8.
  11. H. Chen, W. Lou, and Z. Wang, "Conflicting-set-based wormhole attack resistant localization in wireless sensor networks," in Ubiquitous Intelligence and Computing. Springer, 2009, pp. 296–309.
  12. L. Lazos and R. Poovendran, "Serloc: Secure rangeindependent localization for wireless sensor networks," in Proceedings of the 3rd ACM workshop on Wireless security. ACM, 2004, pp. 21–30.
  13. A. Hafslund, A. Tønnesen, R. B. Rotvik, J. Andersson, and Ø. Kure, "Secure extension to the olsr protocol," in Proceedings of the OLSR Interop and Workshop, San Diego, 2004.
  14. F. Hong, L. Hong, and C. Fu, "Secure olsr," in Advanced Information Networking and Applications, 2005. AINA 2005. 19th International Conference on, vol. 1. IEEE, 2005, pp. 713–718.
  15. B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in Proceedings of the 1st ACM workshop on Wireless security. ACM, 2002, pp. 21–30.
  16. R. Chaki and N. Chaki, "Idsx: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network," in Computer Information Systems and Industrial Management Applications, 2007. CISIM'07. 6th International Conference on. IEEE, 2007, pp. 179–184.
  17. H. Ronghui, M. Guoqing, W. Chunlei, and F. Lan, "Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes," vol. 55. Citeseer, 2009.
  18. D. B. Roy, R. Chaki, and N. Chaki, "A new cluster-based wormhole intrusion detection algorithm for mobile ad-hoc networks," 2010.
  19. D. krishna Chaitanya and G. Arindam, "Analysis of denialof- service attacks on wireless sensor networks using simulation," 2011.
  20. M. Azer, S. El-Kassas, and M. El-Soudani, "A full image of the wormhole attacks-towards introducing complex wormhole attacks in wireless ad hoc networks," 2009.
  21. S. Marti, T. J. Giuli, K. Lai, M. Baker et al. , "Mitigating routing misbehavior in mobile ad hoc networks," in International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking, vol. 6, no. 11, 2000, pp. 255–265.
Index Terms

Computer Science
Information Sciences

Keywords

Wormhole attack Wireless Sensor Networks Promiscuous mode Ad-hoc on demand distance vector routing protocol Malicious nodesifx