View
217
Download
0
Category
Preview:
Citation preview
7/30/2019 ITCSE_paper4
1/4
IRNet Transactions on Computer Science and Engineering
21
Detection of Wormhole Attack in Wireless Sensor Networks
Kuldeep Kaur, Vinod Kumar & Upinderpal Singh
Department of Computer Science & Engineering, Lovely Professional University Punjab, India
E-mail : deepu_judge14@yahoo.co.in, vinod.15779@lpu.co.in & upinder.singh418 @gmail.com
Abstract - The wireless sensor network is the collection of sensor nodes which collect information from the environment, theenvironment may be the building, industrial, battle field or elsewhere. Due to the wireless nature of the sensor nodes they are prone
to various attacks like wormhole attack, grayhole, packet flooding, sinkhole attack, blackhole attack, sync attack, Sybil attack. In this
paper I proposed the solution to detect the wormhole attack. In this solution I use the concept of digital signature in the packet
header information .Using this solution the sensor nodes can be authenticate and can avoid the wormhole attack as possible in
wireless sensor networks.
Keywords - Hello, Sensor.
I. INTRODUCTION
A Wireless Sensor Network [1] is a self-configuring
network of small sensor nodes communicating among
themselves using radio signals, and deployed in quantity
to sense, monitor and understand the physical world.
The wireless sensor nodes are called motes. A huge
number of these devices configure the network and
these motes have following capabilities: -
1) Computational capabilities.2) Sensing capabilities.3) Communication capabilities.As we know that wireless sensor network
technology is a technology in which sensor works under
the rigorous conditions where human cannot survive for
long. The major challenge in the field of wireless sensor
technology is the energy consumption along with good
bandwidth. This issue requires innovative design
techniques to use the available bandwidth and energy
efficiency.
II. ARCHITECTURE FOR NODES INWIRELESS SENSOR NETWORKS
The nodes have to meet the requirement of a
specific application. They should be small cheap,
portable and energy efficient. The basic components of anode are:
1) Sensor and actuator - An interface to the physicalworld designed to sense the environmental
parameters like pressure and temperature.
2) Controller It is used to control different modes ofoperation for processing of data.
3) Memory - Storage for programming data.4) Communication - A device like antenna for
sending and receiving data over a wireless channel.
5) Power Supply- Supply of energy for smoothoperation of a node like battery[2].
Fig. 1: Architecture of sensor node
III.ATTACKS IN WIRELESS SENSORNETWORKS
The open nature of the wireless communication
channels, the lack of infrastructure, the fast deployment
practices, and the hostile environments where they may
7/30/2019 ITCSE_paper4
2/4
Detection of Wormhole Attack in Wireless Sensor Networks
IRNet Transactions on Computer Science and Engineering
22
be deployed, make them vulnerable to a wide range of
security attacks. The attacks such as[1]
1) Spoofed, altered, or replayed routinginformation
2) Selective forwarding3) Sinkhole attacks4) Sybil attacks5) Wormholes6) HELLO flood attacks
Spoofed, altered, or replayed routing information
The most direct attack against a routing protocol is
to target the routing information exchanged between
nodes. By spoofing, altering, or replaying routing
information, adversaries may be able to create routing
loops, attract or repel network traffic, extend or shortensource routes, generate false error messages, partition
the network, increase end-to-end latency, etc.[1]
Selective forwarding
Multi-hop networks are often based on the
assumption that participating nodes will faithfully
forward received messages. In a selective forwarding
attack, malicious nodes may refuse to forward certain
messages and simply drop them, ensuring that they are
not propagated any further. A simple form of this attack
is when a malicious node behaves like a black hole and
refuses to forward every packet .[3]
Sinkhole attacks
In a sinkhole attack, the adversarys goal is to lure
nearly all the traffic from a particular area through acompromised node, creating a metaphorical sinkhole
with the adversary at the centre. Because nodes on, or
near, the path that packets follow have many
opportunities to tamper with application data, sinkhole
attacks can enable many other attacks . Sinkhole attacks
typically work by making a compromised node look
especially attractive to surrounding nodes with respect
to the routing algorithm. [2][3].
Sybil attack
In a Sybil attack a single node presents multiple
identities to other nodes in the network. The Sybil attack
can significantly reduce the effectiveness of fault-
tolerant schemes such as distributed storage andmultipath. Replicas, storage partitions, or routes
believed to be using disjoint nodes could in actuality be
using a single adversary presenting multiple
identities.[2]
HELLO flood attack
Many protocols require nodes to broadcast HELLO
packets to announce themselves to their neighbors, and a
node receiving such a packet may assume that it is
within radio range of the sender. This assumption may
be false: a laptop-class attacker broadcasting routing or
other information with large enough transmission power
could convince every node in the network that the
adversary is its neighbor.[3]
Wormhole Attack
In the wormhole attack, an attacker tunnels
messages received in one part of the network over a low
latency link and replays them in a different part. The
simplest instance of this attack is a single node situated
between two other nodes forwarding messages between
the two of them. However, wormhole attacks more
commonly involve two distant malicious nodes
colluding to understate their distance from each other by
relaying packets along an out-of-bound channel
available only to the attacker. An attacker situated close
to a base station may be able to completely disrupt
routing by creating a well-placed wormhole. An attacker
could convince nodes who would normally be multiple
hops from a base station that they are only one or two
hops away via the wormhole. This can create a sinkhole:
since the attacker on the other side of the wormhole can
artificially provide a high-quality route to the base
station, potentially all traffic in the surrounding area will
be drawn through if alternate routes are significantly
less attractive. This will most likely always be the case
when the endpoint of the wormhole is relatively far from
a base station[4].
Fig. 2 : Illustration of wormhole attack in wireless
network.
7/30/2019 ITCSE_paper4
3/4
Detection of Wormhole Attack in Wireless Sensor Networks
IRNet Transactions on Computer Science and Engineering
23
IV. PROPOSED SOLUTIONIn this section I will explain in detail the proposed
solution node authentication using the digital signature.
In this algorithm the authentication is provided at each
sensor node in the packet header which is forward from
source to destination. Only the authenticate nodes can
communicate in wireless sensor network. Using this
authentication procedure we can detect the malicious
nodes which causes the wormhole attack.
ALGORITHM
Source Node
If (Any Packet sent P)
{
Alter Header add columns =Route and =Signatures
Insert id into Route Column
Insert Digital Signature into Signature Column
Forward Packet P
}
If (received A Packet)
{
If (Received Packet==Data_Ack)
{
Note the =Signature in the header
Note Route Noted In header
Verify the Digital Signature
If(Verification Successful)
{
Discard the route noted
Else
{
Drop the packet
}
Repeat the procedure for next packet
}
}
Intermediate Node
If (Received a packet P)
{
Insert id into Route Column
Insert Digital Signature into Signature Column
Forward Packet P
}
Destination Node
If (Received a packet P)
{
Note the =Signature in the header
Note Route Noted In header
Verify the Digital Signature
If(Verification Successful)
Note the =Signature in the header
Note Route Noted In header
Verify the Digital SignatureIf(Verification Successful)
{
Noted route=Null;
}
Else
{
Noted Route unchanged
}
Create Data_Ack Packet
Insert columns =Route and =Signatures in
Data_Ack
}
Insert id into Route Column
Insert Digital Signature into Signature Column
}
V. CONCLUSIONSecurity related issues in wireless sensor networks
have become an important part of research in present
scenario. To detecting malicious functions of node and
offering efficient counter measure is the difficult task. Inthe proposed method there is no need for specific
hardware and neither is the need for clock
synchronization due to use of cryptographic concept
digital signature. In that each node authenticate using
digital signature. The received node at the destination
7/30/2019 ITCSE_paper4
4/4
Detection of Wormhole Attack in Wireless Sensor Networks
IRNet Transactions on Computer Science and Engineering
24
node is verified and if the digital signature is false the
information about that is sent to the sender node using
DATA_ACK.
REFERENCES
[1] Guiyi Wei Xueli Wang Detecting Wormhole
Attacks Using Probabilistic Routing andRedundancy Transmission. WASE International
Conference on Information Engineering 2010.PP-
251-254.
[2] Junfeng Wu, HonglongChe, Label-Based DV-
Hop Localization AgainstWormhole Attacksin
Wireless Sensor Networks.Fifth IEEE
International Conference on Networking,
Architecture, and Storage 2010. Pp-79-88.
[3] Zhibin Zhao, Bo Wei, Xiaomei Dong, Lan Yao,
FuxiangGaoDetecting Wormhole Attacks in
Wireless Sensor Networks with Statistical
AnalysisFirst International Conference on
Integrated Intelligent Computing.pp-283-289.
[4] Prasannajit B1, Venkatesh, Anupama S An
Approach towards Detection of Wormhole Attack
in Sensor Networks 2010 First International
Conference on Integrated Intelligent Computing.
[5] Thorne, Kip S. (1994). Black Holes and Time
Warps. W. W. Norton. p. 504.ISBN 03-23763.
[6] DeBenedictis, Andrew and Das, A. (2001). "On a
General Class of Wormhole
Geometries". Classical and Quantum
Gravity 18 (7): 11871204.
[7] Forman G., Zahorjan J,The challenges of mobile
computing,IEEE Computer; 27(4):38-47.
[8] Bayrem Triki, Slim Rekhis, Noureddine
Boudriga , Digital Investigation of Wormhole
Attacks in Wireless Sensor Networks, Network
Computing and Applications, IEEE International
Symposium, July 2009, pp. 179-186 .
[9] Dezun Dong, Mo Li, Yunhao Liu, Xiangke
Liao , Connectivity-Based Wormhole Detection
in Wireless Ad Hoc and Sensor Networks,
Parallel and Distributed Systems, International
Conference on , December 2009, pp. 72-79 .
[10] B. Prasannajit, Anupama S. Venkatesh, K.
Vindhykumari, S.R. Subhashini, G. Vinitha , An
Approach Towards Detection of WormholeAttack in Sensor Networks, Integrated
Intelligent Computing , August 2010, pp. 283-
289.
Recommended