DOI QR코드

DOI QR Code

The Wormhole Routing Attack in Wireless Sensor Networks (WSN)

  • Received : 2010.02.08
  • Accepted : 2010.03.31
  • Published : 2010.06.30

Abstract

Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to the inherently constrained capabilities of sensor nodes. Although a wide variety of routing protocols have been proposed for WSNs, most do not take security into account as a main goal. Routing attacks can have devastating effects on WSNs and present a major challenge when designing robust security mechanisms for WSNs. In this paper, we examine some of the most common routing attacks in WSNs. In particular, we focus on the wormhole routing attack in some detail. A variety of countermeasures have been proposed in the literature for such attacks. However, most of these countermeasures suffer from flaws that essentially render them ineffective for use in large scale WSN deployments. Due to the inherent constraints found in WSNs, there is a need for lightweight and robust security mechanisms. The examination of the wormhole routing attack and some of the proposed countermeasures makes it evident that it is extremely difficult to retrofit existing protocols with defenses against routing attacks. It is suggested that one of the ways to approach this rich field of research problems in WSNs could be to carefully design new routing protocols in which attacks such as wormholes can be rendered meaningless.

Keywords

References

  1. Rehana, J. (2009). Security of wireless sensor network. Seminar on Internetworking (TKK T-110.5190). Helsinki University of Technology
  2. Padmavathi, G., & Shanmugapriya, D. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS): Vol.4, No.1 & 2
  3. Hanapi,. Z.M. Ismail,. M,. Jumari,. K. & Mahdavi,. M. (2009). Dynamic window secured implicit geographic forwarding routing for wireless sensor network. World Academy of Science, Engineering and Technology
  4. Deng, H., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks, IEEE Communications Magazine (p 70-75) https://doi.org/10.1109/MCOM.2002.1039859
  5. Karlof, C., & Wagner,. D. (2003). Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks Journal: Special Issue on Sensor Network Applications and Protocols. Vol.1, (p293-315), Elsevier Publications https://doi.org/10.1016/S1570-8705(03)00008-8
  6. Naeem,. T & Loo,. K. K. (2009). Common security issues and challenges in wireless sensor networks and IEEE 802.11 wireless mesh networks. International Journal of Digital Content Technology and its Applications: Volume 3, Number 1. (p 89-90)
  7. Lee , J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications, (p76-84) https://doi.org/10.1109/MWC.2007.4396946
  8. Kavitha, T., & Sridharan, D. (2010). Security vulnerabilities in wireless sensor networks: a survey. Journal of Information Assurance and Security 5, (p31-44)
  9. Bojkovic,. Z. S., Bakmaz,. B. M,. & Bakmaz,. M. R. (2008). Security issues in wireless sensor networks. International Journal of Communications: Issue 1, Volume 2
  10. Raj,. P. N. & Swadas,. P. B,. (2009). DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. International Journal of Computer Science Issues (IJCSI): Vol.2
  11. Venkatraman, L., Agrawal, D. P. (2003). Strategies for enhancing routing security in protocols for mobile ad hoc networks. In Journal for Parallel Distributed Computing. 63 (p 214-227) https://doi.org/10.1016/S0743-7315(02)00065-5
  12. Kalita, H. K., & Kar, A. (2009). Wireless sensor network security analysis. International Journal of Next-Generation Networks (IJNGN)
  13. Kaissi, R. E., Kayssi, A., Chehab, A., & Dawy, Z. (2005). DAWWSEN: A defense mechanism against wormhole attacks in wireless sensor networks. The Second International Conference on Innovations in Information Technology (IIT’05). American University of Beirut. Beirut, Lebanon.
  14. Karlof, C., & Wagner,. D. (2005). Summary of “secure routing in wireless sensor networks: attacks and countermeasures”. In Seminar on Theoretical Computer Science
  15. Newsome, J., Shi, E., Song, D., & Perrig, A. (2004). The sybil attack in sensor networks: analysis & defenses. In Proceedings of Third International Symposium on Information Processing in Sensor Networks. (p259-268). (ACM 1-58113-846-6) https://doi.org/10.1145/984622.984660
  16. Jen, S. M., Laih,. C.S., and KuoW,. C. (2009). A hop-count analysis scheme for avoiding wormhole attacks in MANET. In Sensors
  17. Kumar, H., Sarma, D., & Kar, K. (2006). Security threats in wireless sensor networks. IEEE https://doi.org/10.1109/CCST.2006.313457
  18. Zhou, Y., Fang, Y. & Zhang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys & Tutorials. Vol:10, Issue 3, (p 6-28) https://doi.org/10.1109/COMST.2008.4625802
  19. Walters, J. P., Liang, Z., Shi, W., & Chaudhary, V. (2006). Wireless sensor network security: a survey. Security in Distributed, Grid and Pervasive Computing. (p 3-5, 10-15)
  20. Santi, P. (2005). Topology control in wireless ad hoc and sensor networks. Chichester, England: John Wiley & Sons
  21. Hanapi, Z. M., Ismail, M., Jumari, K., & Mirvaziri, H. (2008). Analysis of routing attacks in wireless sensor network. In Proceedings of International Cryptology Workshop and Conference (Cryptology2008). (p 202-214). ISBN 978-983-4069
  22. Khalil, I., Bagchi, S., & Shroff, N. B. (2007). Liteworp: detection and isolation of the wormhole attack in static multi-hop wireless networks. Computer Networks. Vol 51(15)
  23. Hu, Y. C., Perrig, A. & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE Infocom
  24. Law, Y. W., & Havinga, P. (2005). How to secure a wireless sensor network. (p 89-95)
  25. Wood, A. & Stankovic, J. (2002). Denial of service in sensor networks. In Computer. Vol 35, (p 54 - 62) https://doi.org/10.1109/MC.2002.1039518
  26. Znaidi, W., Minier, M., & Babau, J. P. (2008). An ontology for attacks in wireless sensor networks. Institut National De Recherche En Informatique Et En Automatique

Cited by

  1. Exploiting SIMD parallelism on dynamically partitioned parallel network coding for P2P systems vol.39, pp.1, 2013, https://doi.org/10.1016/j.compeleceng.2012.02.009