Wireless Sensor Network Security: Approaches to Detecting and Avoiding Wormhole Attacks
Abstract
This paper explores Wireless Sensor Networks (WSNs) and the related security issues and complications arising from a specific type of security breach, the wormhole attack. Wormhole attacks against WSNs are classified as passive, external laptop-class threats. Because malicious wormhole attacks are increasing, these attacks pose a serious security threat and increase the costs to maintain a Wireless Sensor Network. Research into preventing wormhole attacks yields two distinct model approach types: Administrator-Viewpoint models and User-Viewpoint models. While the modalities vary, the four Administrator-Viewpoint models reviewed were designed in the early 2000s and suggest defending against wormhole attacks through the use of expensive hardware, packet leashes, or topology visualization systems. On the other hand, the four proposed User-Viewpoint models have become the current theoretical models of choice. While existing as simulation approaches to defend against wormhole attacks, the User-Viewpoint models use internally calculated routing algorithms to suggest routes to avoid or evade, not defend against, established wormhole routes. This paper confirms the efficacies of the User-Viewpoint models in the lab simulations are viewed as the most promising cost-effective, future security solutions to wormhole attacks.
Downloads
References
Bankovic, Z., Fraga, D., Moya, J., & Vallejo, J. C. (2012). Detecting unknown attacks in wireless sensor networks that contain mobile nodes. Sensors, 12(8).
He, R., Ma, G., Wang, C., & Fang, L. (2009). Detecting and locating wormhole attacks in wireless sensor networks using beacon nodes. World Academy of Science, Engineering and Technology, 55.
Honglong, C., Wei, L., Xice, S., & Zhi, W. (2010). A secure localization approach against wormhole attacks using distance consistency. EURASIP Journal on Wireless Communications and Networking, 2010, 1-11.
Hu, Y., Perring, A., & Johnson, D. B. (2003). Packet leashes: A defense against wormhole attacks in wireless networks. Proceedings of 22nd Annual Conference of the IEEE Computer and Communication Societies, 3, pp. 1976-1986.
Jagadeesan, S. (2016). Wireless sensor network security. Proceedings of 3rd International Conference on Recent Innovations in Science, Technology, Management and Environment, 16, pp. 202-209.
Jha, M. K., & Sharma, T. P. (2010). A new approach to secure data aggregation protocol for wireless sensor network. International Journal on Computer Science & Engineering, 1(5), 1539-1543.
Kumar, K., Waheed, M., & Basappa, K. (2010, October). TCPL: A defense against wormhole attacks in wireless sensor networks. Paper presented at AIP Conference Proceedings, Ipswich, United Kingdom.
Lazos, L., Poovendran, R., Meadows, C., Syverson, P., & Chang, L. W. (2005). Preventing wormhole attacks on wireless ad hoc networks: A graph theoretic approach. Proceedings of Wireless Communications and Networking Conference, 2005 IEEE, pp. 1193-1199.
Mahadevi, G. (2011). Location discovery with security in wireless sensor networks. International Journal on Computer Science & Engineering, 3(4), 1528-1533.
Meghdadi, M., Ozdemir, S., & Guler, I. (2011). A survey of wormhole-based attacks and their countermeasures in wireless sensor networks. IETE Technical Review, 28(2), 89-102.
Qiu, Y., Zhou, J., Baek, J., & Lopez, J. (2010). Authentication and key establishment in dynamic wireless sensor networks. Sensors, 10(4), 3718-3731.
Rahman, M., & El-Khatib, K. (2009). Secure anonymous communication for wireless sensor networks based on pairing over elliptic curves. Journal of Interconnection Networks, 10(4), 459-479.
Rani, A. & Kumar, S. (2017). A survey of security in wireless sensor networks. Proceedings of 3rd International Conference on Computational Intelligence & Communication Technology, 8, 256-260.
Shabana, K., Fida, N., Khan, F., Jan, S.R., & Rehman, M. (2016). Security issues and attacks in Wireless Sensor Networks. International Journal of Advanced Research in Computer Science and Electronics Engineering, 5(7), 81-87.
Shang-Ming, J., Chi-Sung, L., & Wen-Chung, K. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. Sensors, 9(6), 5022-5039.
Sharma, P., & Bhadana, P. (2010). An effective approach for providing anonymity in wireless sensor network: Detecting attacks and security measures. International Journal on Computer Science & Engineering, 1(5), 1830-1835.
Tun, Z., & Maw, A. H. (2008). Wormhole attack detection in wireless sensor networks. Proceedings of World Academy of Science Engineering and Technology, 46, pp. 545-550.
Wang, W., & Bhargava, B. (2004). Visualization of wormholes in sensor networks. In Proceedings of the 2004 ACM Workshop on Wireless Security (pp. 51-60). Philadelphia, PA: ACM WiSE'04.
TRANSFER OF COPYRIGHT
JRBEM is pleased to undertake the publication of your contribution to Journal of Research in Business Economics and Management.
The copyright to this article is transferred to JRBEM(including without limitation, the right to publish the work in whole or in part in any and all forms of media, now or hereafter known) effective if and when the article is accepted for publication thus granting JRBEM all rights for the work so that both parties may be protected from the consequences of unauthorized use.