DOI QR코드

DOI QR Code

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • 투고 : 2024.05.05
  • 발행 : 2024.05.30

초록

The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.

키워드

참고문헌

  1. Y. Hu, A. Perrig, and D.B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols".
  2. I. Khalil, S. Bagchi, and N.B. Shroff, "LITE WORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks," Proc. Int. Conf. Dependable Syst. Networks, pp.612-621, 2005.
  3. Y. Hu, A. Perrig, and D.B. Johnson, "Wormhole Attacks in Wireless Networks," vol.24, no.2, pp. 370-380, 2006. https://doi.org/10.1109/JSAC.2005.861394
  4. S. Capkun, and J. Hubaux, "SECTOR : Secure Tracking of Node Encounters in Multi-hop Wireless Networks Categories and Subject Descriptors," vol. 67322, pp.5005. 2003.
  5. W. Wang, and Y. Lu, "Defending against Wormhole Attacks in Mobile Ad Hoc Networks".
  6. P. Van Tran, L.X. Hung, Y. Lee, S. Lee, and H. Lee, "TTM : An Efficient Mechanism to Detect Wormhole Attacks in Wireless Ad-hoc Networks," pp.593-598, 2007.
  7. A.S. Alshamrani, "Workshops of International Conference on Advanced Information Networking and Applications PTT : Packet Travel Time Algorithm in Mobile Ad Hoc Networks," pp.561-568, 2011.
  8. C.E. Perkins, M. Park, and E.M. Royer, " Ad-hoc On-Demand Distance Vector Routing," 2006.
  9. M. Khabbazian, H. Mercier, and V.K. Bhargava, "Wormhole Attack in Wireless Ad Hoc Networks : Analysis and Countermeasure".
  10. L. Qian, N. Song, and X. Li, "Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach", vol.30, pp.308-330, 2007. https://doi.org/10.1016/j.jnca.2005.07.003
  11. C. Paper, W. Znaidi, and S. Appliqu, "Detecting wormhole attacks in wireless networks using local neighborhood information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information", 2008.
  12. D. Dong, M. Li, Y. Liu, and S. Member, "Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks," vol.19, no.6, pp.1787-1796, 2011.
  13. L. F. Garcia, and J. Robert, "Preventing Layer-3 Wormhole Attacks in Ad-hoc Networks with Multipath DSR," pp.15-20, 2009.
  14. M.Y. Su, "WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks", Comput. Secur. , vol.29, no.2, pp.208-224, 2010. https://doi.org/10.1016/j.cose.2009.09.005
  15. Y. Yu, L. Guo, X. Wang, and C. Liu, "ad hoc networks", Comput. Networks, vol.54, no.9, pp. 1460-1469, 2010. https://doi.org/10.1016/j.comnet.2009.11.004
  16. Prasannajit, B. Anupama, S. Vindhykumari, K.S.R. Subhashini, and G. Vinitha, "An Approach towards Detection of Wormhole Attack in Sensor Networks," 2010.
  17. D. Kim, D. Kim, H. Park, and S. Yoo, "Performance Evaluation of Routing Protocols for Wireless Sensor Networks in Military Scenarios", pp.101-106, 2011.
  18. S.G. Smieee, N.C. Mieee, N. Tada, and S. Trivedi, "Scenario-based Performance Comparison of Reactive", Proactive & Hybrid Protocols in MANET, pp.0-4, 2012.
  19. A. Goyal, "Simulation and Performance Analysis of Routing Protocols in Wireless Sensor Network using QualNet," vol. 52, no.2, pp.47-50, 2012. https://doi.org/10.5120/8178-1499
  20. R. Ahuja, and A.B. Ahuja, "Performance Evaluation and Comparison of AODV and DSR Routing Protocols in MANETs Under Wormhole Attack," pp.699-702, 2013.
  21. B. Paul, K.A. Bhuiyan, K. Fatem, and P. P.Das, "Analysis of AOMDV, AODV, DSR and DSDV Routing Protocols for Wireless Sensor Network", 2014.