A Review : Wormhole Attack and Wireless Sensor Networks

Authors

  • Hakam Singh Anjana  M Tech Scholar, Computer Science & Engineering, Millennium Institute of Technology and Science, Bhopal, India
  • Prof. Vinod Mahor  Assistant Professor, Computer Science & Engineering, Millennium Institute of Technology and Science Bhopal, India

Keywords:

Wormhole attack, Wireless sensor networks, Security, Anomaly detection.

Abstract

Wormhole attacks are a type of security threat where an attacker captures packets at one location in a network and tunnels them to another location to retransmit them, bypassing intermediate nodes. These attacks are difficult to detect and can cause serious damage to the network. The proposed technique involves constructing a graph representation of the network topology and analyzing the shortest path between nodes. The technique uses two algorithms: the Floyd-Warshall algorithm and the Dijkstra algorithm, to compute the shortest paths and identify any anomalies in the graph. The technique is shown to be effective in detecting wormhole attacks with high accuracy and low false positives. The paper provides a comprehensive review of existing techniques for wormhole attack detection and compares them with the proposed technique. It also discusses the limitations and future directions of research in this area. Overall, the proposed graph-based technique is a promising approach for detecting wormhole attacks in WSNs, and has the potential to improve the security of these networks.

References

  1. Ali, A. Khan, A. Ahmad, M. H. Rehmani, and S. U. Khan, “A review of recent advancements in wireless sensor network security,” Journal of Network and Computer Applications, vol. 97, pp. 1-27, 2017.
  2. L. Hu and D. Evans, “Using directionality to prevent wormhole attacks,” Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 27-37, 2003.
  3. M. F. Zhong, J. Chen, Y. Zhang, and S. Zhu, “Detecting wormhole attacks in wireless networks using connectivity information,” Proceedings of the 4th International Conference on Mobile Ad-hoc and Sensor Networks, pp. 76-85, 2008.
  4. S. S. Tyagi and S. Kumar, “Detection and prevention of wormhole attack in wireless sensor networks: A survey,” International Journal of Distributed Sensor Networks, vol. 10, no. 2, 2014.
  5. M. H. Anisi, M. A. M. Ali, H. A. Jalab, A. Basit, and M. A. Razzaque, “A comprehensive survey of wireless sensor network applications, routing, and security challenges,” International Journal of Distributed Sensor Networks, vol. 10, no. 7, 2014.
  6. Y. Xu, J. Heidemann, and D. Estrin, “Geography-informed energy conservation for ad hoc routing,” Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 70-84, 2001.
  7. S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 255-265, 2000.
  8. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
  9. Karp and H. T. Kung, “GPSR: Greedy perimeter stateless routing for wireless networks,” Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243-254, 2000.
  10. J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, “Providing robust and ubiquitous security support for mobile ad-hoc networks,” Proceedings of the 2nd ACM International Workshop on Wireless Mobile Multimedia, pp. 1-10, 1999.
  11. F. Li, M. Thai, D. Du, and P. Mohapatra, “On the survivability of data aggregation in wireless sensor networks,” Proceedings of the 5th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 290-299, 2004.
  12. K. Zhang, K. Liu, and Y. Liu, “A lightweight intrusion detection method based on energy consumption pattern in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 11, pp. 1757-1770, 2014.
  13. M. K. Marina and S. R. Das, “On the effectiveness of distributed packet forwarding in sensor networks,” Proceedings of the 3rd International Conference on Mobile Systems, Applications, and Services, pp. 61-72, 2005.
  14. W. Ye, J. Heidemann, and D. Estrin, “Medium access control with coordinated adaptive sleeping for wireless sensor networks,” IEEE/ACM Transactions on Networking, vol. 12, no. 3, pp. 493-506, 2004.
  15. Y. Sun, J. Han, S. Kim, and S. Moon, “A probabilistic-based approach to detect wormhole attacks in wireless ad hoc networks,” Proceedings of the 23rd International Conference on Distributed Computing Systems, pp. 620-625, 2003.

Downloads

Published

2023-04-30

Issue

Section

Research Articles

How to Cite

[1]
Hakam Singh Anjana, Prof. Vinod Mahor, " A Review : Wormhole Attack and Wireless Sensor Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 9, Issue 2, pp.318-323, March-April-2023.