Detection of Wormhole Attack in Wireless Sensor Networks

Although Secure routing is the demand of the hour in the application of wireless sensor networks (WSN), secure routing is a challenge in itself due to the inherently limited capacities of sensor nodes. Routing attacks are a major challenge in the process

  • PDF / 208,961 Bytes
  • 8 Pages / 439.37 x 666.142 pts Page_size
  • 23 Downloads / 208 Views

DOWNLOAD

REPORT


Abstract Although Secure routing is the demand of the hour in the application of wireless sensor networks (WSN), secure routing is a challenge in itself due to the inherently limited capacities of sensor nodes. Routing attacks are a major challenge in the process of designing of effective and robust security mechanisms for WSNs. This main focus of this paper is on wormhole routing attack. The measures which have been proposed till now to counter the routing attacks suffer from flaws that essentially prove the fact that they are not good enough for use in large-scale WSN deployments. We need light weight and hard-bearing security mechanisms due to inherent limitations found in WSNs. In this paper, we discuss a wormhole detection method: WGDD (wormhole geographic distributed detection). Keywords Ad hoc

 WSN  Wormhole

1 Introduction Mobile ad hoc and wireless networks are now considered to be most prevalent when we talk about modern days communications. Various types of malicious attacks on wireless sensor networks have been described very well in earlier books; they are classified as laptop class and mote class attacks, outsider and insider attacks, active and passive attacks. The secure location, network routing, also data aggregation and clustering protocols are affected by wormhole. To deal with this attack is very difficult task because of the fact that the attacker does not need to make any changes in any legitimate nodes or have access to any cryptographer keys [1, 2]. An introduction of easy and effective ways to detect and locate wormhole is given in this paper. J. Yadav (&)  M. Kumar The Technological Institute of Textile and Sciences, Bhiwani, India e-mail: [email protected] M. Kumar e-mail: [email protected] © Springer Science+Business Media Singapore 2016 S.C. Satapathy et al. (eds.), Proceedings of International Conference on ICT for Sustainable Development, Advances in Intelligent Systems and Computing 408, DOI 10.1007/978-981-10-0129-1_26

243

244

J. Yadav and M. Kumar

Fig. 1 Two or more malicious nodes collaborate in setting up a shortcut link between each other

2 Wormhole Attack In wormhole attacks, a low-latency link is created between two points in the network by the attackers. This achievement can be attained by either forcing two or more sensor nodes of the network to compromise or add n entirely new set of naughty nodes to the network. At the one end of the link, the attacker collects data packets using low-latency link are sent and are replayed at the other end at the establishment of the link [3]. The base station is deceived as wormhole attack changes the network data flow. It is not easy to detect wormhole as the replayed information is usually valid (Fig. 1). When and if the wormhole attackers get hold of link, then it can be dangerous in several ways for the network. This attack can be launched even when the cryptographic keys are absent and even giving up hold of any legal node which is a part of the network. The wormhole attack cannot be defended by cryptographi