Effective Wormhole Attack Detection and Isolation In 6lowpan Networks

Authors

  • R. Sujatha  Ph.D. Research Scholar, Department of Computer Science, MaruduPandiyar College, Thanjavur , Tamilnadu, India
  • P. Srivaramangai  Associate Professor, Department of Computer Science, MaruduPandiyar College, Thanjavur , Tamilnadu, India

Keywords:

6LoWPAN Networks, MANET, Worm Hole Attack, RPL

Abstract

Nowadays the improvements in MANET needs for technological enlargement for the efficient data transmission which can be attained throughout the wireless architecture that has its advancements to the core i.e., 6LoWPAN Networks. In common, nearly all the sensors have the ability of communication and the requirement of low power consumption. 6LoWPAN (Low Power Sensor or Mobile devices in IPV6 Network with Gateway) plays a brilliant role in this convergence of heterogeneous technologies thereby permitting sensors to broadcast information using IPv6 stack. Sensors tend to be targets of attacks out of which Wormhole attack is one of the most familiar and threatens the network accessibility by dropping data in between or disturbing routing paths. RPL (IPv6 Routing Protocol for Low-Power and Lossy Networks) is a usual routing protocol used in sensor networks and it recommends a RPL-based wormhole detection mechanism. The rank of a node-defined RPL is used to determine the distance through the differences. The proposed detection method determines malicious wormhole nodes if unreasonable rank values are recognized. The experimental results prove that the proposed detection method can identify wormholes effectively under different wireless 6LoWPAN networks.

References

  1. M Ali, T Suleman, ZA Uzmi. "MMAC: A mobility-adaptive, collision-free mac protocol for wireless sensor networks," in Performance, Computing, and Communications Conference, 2005. IPCCC 2005. (24th IEEE International, Phoenix, 2005), pp. 401-407
  2. L Hu, D Evans. "Using Directional Antennas to Prevent Wormhole Attacks," in NDSS, (San Diego, 2004)
  3. Y-C Hu, A Perrig, DB Johnson. "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. (IEEE Societies, San Francisco, 2003), pp. 1976-1986
  4. Y-C Hu, A Perrig, DB Johnson, "Wormhole attacks in wireless networks," Selected Areas in Communications. IEEE J 24, 370-380 (2006)
  5. T Tsvetkov, RPL: IPv6 routing protocol for low power and lossy networks. Sens Nodes Oper Netw Appl 59, 2 (2011)
  6. T Winter, "RPL: IPv6 routing protocol for low-power and lossy networks". 2012
  7. L Wallgren, S Raza, T Voigt. "Routing Attacks and Countermeasures in the RPL-based Internet of Things," International Journal of Distributed Sensor Networks, vol. 2013, 2013. http://dsn.sagepub.com/content/9/8/794326.full
  8. O Garcia-Morchon, S Kumar, R Struik, S Keoh, R Hummen, Security Considerations in the IP-based Internet of Things, 2013
  9. I Khalil, S Bagchi, NB Shroff, MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Netw 6, 344-362 (2008)
  10. R Poovendran, L Lazos, A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wireless Netw 13, 27-59 (2007)
  11. K Sanzgiri, B Dahill, BN Levine, C Shields, EMB Royer. "A secure routing protocol for ad hoc networks," in Network Protocols, 2002. Proceedings. 10th IEEE International Conference on, Paris, 2002, pp. 78-87
  12. P Papadimitratos, ZJ Haas, Secure Routing for Mobile Ad Hoc Networks (the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, 2002), pp. 193-204
  13. I Khalil, S Bagchi, NB Shroff. "LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks," in Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, Yokohama, 2005, pp. 612-621
  14. S Choi, D-y Kim, D-h Lee, J-i Jung. "WAP: Wormhole attack prevention algorithm in mobile ad hoc networks," in Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC-08. (IEEE International Conference, Taichung, 2008), pp. 343-348

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
R. Sujatha, P. Srivaramangai, " Effective Wormhole Attack Detection and Isolation In 6lowpan Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.853-861, May-June-2018.