Abstract
Owing to their deployment characteristics, wireless sensor networks are vulnerable to many more attacks than wired sensor networks. The wormhole attack is a serious threat against wireless sensor networks. Launching this type of attack is easy for an attacker; it requires no breaking of a cryptographic mechanism. However, detecting the attack is very difficult. Moreover, after conducting the wormhole attack, an attacker can create more dangerous attacks. In this paper, we analyze the effects of wormhole attacks, discuss various detection features, and provide a comparison of various approaches. This paper presents various research challenges in the area of wormhole detection in wireless sensor networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hu, Y.C., Perrig, A., Johnson, D.B.: Packet leashes: a defense against wormhole attacks in wireless networks. In: IEEE Computer and Communications Societies. IEEE, vol. 3, pp. 1976–1986 (2003)
Hu, Y.-C., Perrig, A., Johnson, D.B.: Wormhole attacks in wireless networks. IEEE J. Sel. Areas Commun. 24(2), 370–380 (2006)
Poovendran, R., Lazos, L.: A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Wirel. Netw. 13, 27–59 (2007)
Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise—tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2) (2006)
Khalil, I., Bagchi, S., Shroff, N.B.: MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks. J. Ad Hoc Netw. 6, 344–362 (2008)
Lazos, L., Poovendran, R.: SeRLoc: robust localization for wireless sensor networks. ACM Trans. Sens. Netw. 73–100 (2005)
Lazos, L., Poovendran, R.: HiRLoc: high-resolution robust localization for wireless sensor networks. IEEE J. Sel. Areas Commun. 24(2), 233–246 (2006)
Hu, L., Evans, D.: Using directional antennas to prevent wormhole attacks. In: Network and Distributed System Security Symposium (NDSS), pp. 131–141 (2004)
Lu, X., Dong, D., Liao, X.: MDS-based wormhole detection using local topology in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, Article ID 145702, 9 pp. (2012)
Buttyan, L., Dora, L., Vajda, I.: Statistical wormhole detection in sensor networks. In: SAS 2005, pp. 128–141. Springer
Chiu, H.S., Lui, K.S.: DelPHI: wormhole detection mechanism for ad hoc wireless networks. In: 1st IEEE International Symposium on Wireless Pervasive Computing (2006)
Chen, H., Lou, W., Sun, X., Wang, Z.: A secure localization approach against wormhole attacks using distance consistency. EURASIP J. Wirel. Commun. Netw. 2010, 11 pp. (2010)
Shokri, R., Poturalski, M.: A practical secure neighbor verification protocol for wireless sensor networks. In: WiSec’09. ACM, Zurich, Switzerland, 16–18 Mar 2009
Xu, Y., Ouyang, Y., Le, Z., Ford, J., Makedon, F.: Analysis of range-free anchor-free localization in a WSN under wormhole attack. In: MSWiM’07. ACM, Chania, Greece, 22–26 Oct 2007
Sookhak, M., Akhundzada, A., Sookhak, A., Eslaminejad, M., Gani, A., Khan, M.K., Li, X., Wang, X.: Geographic wormhole detection in wireless sensor networks. J. PLOS ONE, 20 Jan 2015. https://doi.org/10.1371/journal.pone.0115324
Lai, G.-H.: Detection of wormhole attacks on IPv6 mobility-based wireless sensor network. EURASIP J. Wirel. Commun. Netw. (2016)
Capkun, S., Buttyan, L., Hubaux, J.P.: SECTOR: secure tracking of node encounters in multi-hop wireless networks. In: Proceedings of the 1st ACM workshop on Security of Ad-hoc and Sensor Networks (SASN 03), pp. 21–32, Oct 2003
Khabbazian, M., Mercier, H., Bhargava, V.K.: Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. IEEE Trans. Wirel. Commun. 8(2), 736–745 (2009)
Qazi, S., Raad, R., Mu, Y., Susilo, W.: Securing DSR against wormhole attacks in multirate ad hoc networks. J. Netw. Comput. Appl. 582–593 (2013)
Ban, X., Sarkar, R., Gao, J.: Local connectivity tests to identify wormholes in wireless networks. In: MobiHoc’11. ACM, Paris, France, 16–20 May 2011
Wang, W., Bhargava, B.: Visualization of wormholes in sensor networks. In: WiSe’04, Proceeding of the 2004 ACM workshop on Wireless Security, pp. 51–60. ACM Press (2004)
Lu, L., Hussain, M.J., Luo, G., Han, Z.: Pworm: passive and real-time wormhole detection scheme for WSNs. Int. J. Distrib. Sens. Netw. 2015, Article ID 356382, 16 pp. (2015)
Singh, R., Singh, J., Singh, R.: WRHT: a hybrid technique for detection of wormhole attack in wireless sensor networks. J. Mob. Inf. Syst. 2016, Article ID 8354930, 13 pp. (2016)
Acknowledgements
The authors are highly thankful to the Gujarat Technological University (Smt. S.R. Patel Engineering College, Unjha) for providing the opportunity to conduct this research work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Patel, M., Aggarwal, A., Chaubey, N. (2018). Analysis of Wormhole Attacks in Wireless Sensor Networks. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 708. Springer, Singapore. https://doi.org/10.1007/978-981-10-8636-6_4
Download citation
DOI: https://doi.org/10.1007/978-981-10-8636-6_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8635-9
Online ISBN: 978-981-10-8636-6
eBook Packages: EngineeringEngineering (R0)