Skip to main content

Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks

  • Conference paper
  • First Online:
International Conference on Security and Privacy in Communication Networks (SecureComm 2014)

Abstract

Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique characteristics. In addition to energy consumption considerations, security has emerged as an equally important aspect in their network design. This is because WSNs are vulnerable to various types of attacks and to node compromises that threaten the security, integrity, and availability of data that resides in these networked systems. This paper develops a powerful, anomaly detection system that relies on visual analytics to monitor and promptly detect a particularly devastating form of attack, the wormhole attack. Wormhole attacks can severely deteriorate the network performance and compromise the security by disrupting the routing protocols. The proposed system, called VA-WAD, efficiently utilizes the routing dynamics to expose an adversary conducting a wormhole attack. Then, the output of the anomaly detection engine feeds the radial visualization engine of VA-WAD, which further assists the understanding and analysis of the network topology improving the detection accuracy. By employing an outer ring, VA-WAD also records the network security events occurring in the WSN on a 24 h basis. The obtained simulation results demonstrate the system’s visual and anomaly detection efficacy in exposing concurrent wormhole attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks - a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor network security: a survey. IEEE Commun. Surveys Tuts. 11(2), 52–73 (2009)

    Article  Google Scholar 

  3. Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surveys Tuts. 10(3), 6–28 (2008)

    Article  Google Scholar 

  4. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2002)

    Google Scholar 

  5. Singh, S.K., Singh, M.P., Singh, D.K.: A survey on network security and attack defense mechanism for wireless sensor networks. International Journal of Computer Trends and Technology 11(2), 1–9 (2011)

    Google Scholar 

  6. Sanzgiri, K., Dahill, B., Levine, B., Shields, C., Belding-Royer, E.: A secure routing protocol for ad hoc networks. In: Proceedings of the 10th IEEE International Conference on Network Protocols, 2002, pp. 78–87 (2002)

    Google Scholar 

  7. Hu, Y.-C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol. 3, pp. 1976–1986. IEEE Societies (2003)

    Google Scholar 

  8. Khabbazian, M., Mercier, H., Bhargava, V.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wireless Commun. 8(2), 736–745 (2009)

    Article  Google Scholar 

  9. Papadimitratos, P., Haas, Z.J.: Secure link state routing for mobile ad hoc networks. In: Symposium on Applications and the Internet Workshops, pp. 379–383. IEEE Computer Society (2003)

    Google Scholar 

  10. Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing, ser. MobiHoc, pp. 1–11 (2011)

    Google Scholar 

  11. Su, M.-Y.: WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks. Comput. Secur. 29(2), 208–224 (2010)

    Article  Google Scholar 

  12. Wang, X., Wong, J.: An end-to-end detection of wormhole attack in wireless ad-hoc networks. In: 31st Annual International Computer Software and Applications Conference, 2007. COMPSAC 2007, vol. 1, pp. 39–48 (2007)

    Google Scholar 

  13. Khalil, I., Bagchi, S., Shroff, N.B.: Liteworp: detection and isolation of the wormhole attack in static multihop wireless networks. Comput. Netw. 51(13), 3750–3772 (2007)

    Article  MATH  Google Scholar 

  14. Keim, D.A.: Information visualization and visual data mining. IEEE Trans. Visual Comput. Graphics 8(1), 1–8 (2002)

    Article  MathSciNet  Google Scholar 

  15. Teoh, S.T., Ma, K.-L., Wu, S.F., Jankun-Kelly, T.J.: Detecting flaws and intruders with visual data analysis. IEEE Comput. Graph. Appl. 24(5), 27–35 (2004)

    Article  Google Scholar 

  16. Thomas, J.J., Cook, K.A.: A visual analytics agenda. IEEE Comput. Graphics Appl. 26, 10–13 (2006)

    Article  Google Scholar 

  17. Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H., Nita-Rotaru, C.: On the survivability of routing protocols in ad hoc wireless networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005. SecureComm 2005, pp. 327–338, September 2005

    Google Scholar 

  18. Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C., Rubens, H.: Odsbr: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4), 6:1–6:35 (2008)

    Article  Google Scholar 

  19. Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: ACM workshop on Wireless Security, pp. 51–60. ACM Press (2004)

    Google Scholar 

  20. Wang, W., Lu, A.: Interactive wormhole detection in large scale wireless networks. In: IEEE Symposium on Visual Analytics Science and Technology, pp. 99–106 (2006)

    Google Scholar 

  21. Karapistoli, E., Economides, A.: Wireless sensor network security visualization. In: 2012 4th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), pp. 850–856, October 2012

    Google Scholar 

  22. IEEE 802.15.4\(^{{\rm TM}} \)-2011: IEEE Standard for Local and Metropolitan Area Networks-Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs)

    Google Scholar 

  23. Draper, G.M., Livnat, Y., Riesenfeld, R.F.: A survey of radial methods for information visualization. IEEE Trans. Vis. Comput. Graph. 15(5), 759–776 (2009)

    Article  Google Scholar 

  24. Diehl, S., Beck, F., Burch, M.: Uncovering strengths and weaknesses of radial visualizations–an empirical approach. IEEE Trans. Vis. Comput. Graph. 16(6), 935–942 (2010)

    Article  Google Scholar 

  25. Brewer, C., Harrower, M.: The Pennsylvania State University. Colorbrewer 2.0 - color advice for cartography. http://colorbrewer2.org

  26. Varga, A., Hornig, R.: An overview of the omnet++ simulation environment. In: International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (Simutools), pp. 1–10. ICST (2008)

    Google Scholar 

Download references

Acknowledgments

This work was performed within the framework of the Action “Supporting Postdoctoral Researchers” of the Operational Program “Education and Lifelong Learning” (Action’s Beneficiary: General Secretariat for Research and Technology), and is co-financed by the European Social Fund and the Greek State.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eirini Karapistoli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Karapistoli, E., Sarigiannidis, P., Economides, A.A. (2015). Visual-Assisted Wormhole Attack Detection for Wireless Sensor Networks. In: Tian, J., Jing, J., Srivatsa, M. (eds) International Conference on Security and Privacy in Communication Networks. SecureComm 2014. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 152. Springer, Cham. https://doi.org/10.1007/978-3-319-23829-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23829-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23828-9

  • Online ISBN: 978-3-319-23829-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics