Table of Contents Author Guidelines Submit a Manuscript
Journal of Computer Networks and Communications
Volume 2016, Article ID 3405264, 15 pages
http://dx.doi.org/10.1155/2016/3405264
Research Article

Wormhole Detection Based on Ordinal MDS Using RTT in Wireless Sensor Network

1School of Education Technology, Jadavpur University, Kolkata, India
2Department of Information Technology, Jadavpur University, Kolkata, India

Received 7 August 2016; Revised 26 September 2016; Accepted 10 October 2016

Academic Editor: Gianluigi Ferrari

Copyright © 2016 Saswati Mukherjee et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Wu, X. Chen, L. Yao, Y. Lee, and K. Yim, “An efficient wormhole attack detection method in wireless sensor networks,” Computer Science and Information Systems, vol. 11, no. 3, pp. 1127–1141, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), vol. 3, pp. 1976–1986, April 2003. View at Scopus
  3. L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” in Proceedings of the Network and Distributed System Security Symposium, pp. 1–11, San Diego, Calif, USA, February 2004.
  4. H. Vu, A. Kulkarni, K. Sarac, and N. Mittal, “Wormeros: a new framework for defending against wormhole attacks on wireless ad hoc networks,” in Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, pp. 491–502, Springer, 2008.
  5. M. R. Alam and K. S. Chan, “RTT-TC: a topological comparison based method to detect wormhole attacks in MANET,” in Proceedings of the 12th IEEE International Conference on Communication Technology (ICCT '10), pp. 991–994, IEEE, Nanjing, China, November 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Ban, R. Sarkar, and J. Gao, “Local connectivity tests to identify wormholes in wireless networks,” in Proceedings of the 12th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '11), ACM, Paris, France, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Lu, D. Dong, and X. Liao, “MDS-based wormhole detection using local topology in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 145702, 9 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information,” in Proceedings of the IEEE 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 107–115, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. W. Wang and A. Lu, “Interactive wormhole detection in large scale wireless networks,” in Proceedings of the IEEE Symposium on Visual Analytics Science and Technology (VAST '06), pp. 99–106, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. S. Čapkun, L. Buttyán, and J.-P. Hubaux, “SECTOR: secure tracking of node encounters in multi-hop wireless networks,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21–32, ACM, Washington, DC, USA, October 2003. View at Scopus
  11. H. S. Chiu and K.-S. Lui, “DePHI: wormhole detection mechanism for ad hoc wireless networks,” in Proceedings of the 2006 1st International Symposium on Wireless Pervasive Computing, pp. 1–6, IEEE, Spa Phuket, Thailand, January 2006. View at Scopus
  12. Z. Tun and A. H. Maw, “Wormhole attack detection in wireless sensor networks,” International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol. 2, no. 10, pp. 2184–2189, 2008. View at Google Scholar
  13. I. Khalil, S. Bagchi, and N. B. Shroff, “LITE WORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,” in Proceedings of the International Conference on Dependable Systems and Networks (DSN ’05), pp. 612–621, Yokohama, Japan, July 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. I. Khalil, S. Bagchi, and N. B. Shroff, “MOBIWORP: mitigation of the wormhole attack in mobile multihop wireless networks,” Ad Hoc Networks, vol. 6, no. 3, pp. 344–362, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Choi, D.-Y. Kim, D.-H. Lee, and J.-I. Jung, “WAP: wormhole attack prevention algorithm in mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC '08), pp. 343–348, Taichung, Taiwan, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  16. R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Networks, vol. 13, no. 1, pp. 27–59, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. Z. Zhao, B. Wei, X. Dong, L. Yao, and F. Gao, “Detecting wormhole attacks in wireless sensor networks with statistical analysis,” in Proceedings of the WASE International Conference on Information Engineering (ICIE '10), vol. 1, pp. 251–254, August 2010. View at Publisher · View at Google Scholar · View at Scopus
  18. L. Lu, M. J. Hussain, G. Luo, and Z. Han, “Pworm: passive and real-time wormhole detection scheme for WSNs,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 356382, 16 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” in Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 51–60, ACM, October 2004. View at Scopus
  20. D. Dong, M. Li, Y. Liu, X.-Y. Li, and X. Liao, “Topological detection on wormholes in wireless ad hoc and sensor networks,” IEEE/ACM Transactions on Networking, vol. 19, no. 6, pp. 1787–1796, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. H. Chen, W. Lou, Z. Wang, J. Wu, Z. Wang, and A. Xi, “Securing DV-Hop localization against wormhole attacks in wireless sensor networks,” Pervasive and Mobile Computing, vol. 16, pp. 22–35, 2015. View at Publisher · View at Google Scholar · View at Scopus
  22. H. Chen, W. Chen, Z. Wang, Z. Wang, and Y. Li, “Mobile beacon based wormhole attackers detection and positioning in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 10, no. 3, Article ID 910242, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. M. C. Van Wezel and W. A. Kosters, “Nonmetric multidimensional scaling: neural networks versus traditional techniques,” Intelligent Data Analysis, vol. 8, no. 6, pp. 601–613, 2004. View at Google Scholar · View at Scopus
  24. V. D. M. Nhat, D. Vo, S. Challa, and S. Lee, “Nonmetric MDS for sensor localization,” in Proceedings of the 3rd International Symposium on Wireless Pervasive Computing (ISWPC '08), pp. 396–400, IEEE, Santorini, Greece, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. C. Miao, G. Dai, K. Mao, Y. Li, and Q. Chen, “RIMDS: multidimensional scaling iterative localization algorithm using RSSI in wireless sensor networks,” in Proceedings of the China Conference on Wireless Sensor Networks, pp. 164–175, Springer, 2014.
  26. B. Li, W. Cui, and B. Wang, “A robust wireless sensor network localization algorithm in mixed LOS/NLOS scenario,” Sensors, vol. 15, no. 9, pp. 23536–23553, 2015. View at Publisher · View at Google Scholar · View at Scopus
  27. V. K. Chaurasiya, N. Jain, and G. C. Nandi, “A novel distance estimation approach for 3D localization in wireless sensor network using multi dimensional scaling,” Information Fusion, vol. 15, no. 1, pp. 5–18, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. X. Zhang, Y. Wu, and X. Wei, “Localization algorithms in wireless sensor networks using nonmetric multidimensional scaling with RSSI for precision agriculture,” in Proceedings of the 2nd IEEE International Conference on Computer and Automation Engineering (ICCAE '10), vol. 5, pp. 556–559, Singapore, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  29. F. Groenen, J. Patrick, and M. Velden, Multidimensional Scaling, Wiley Online Library, 2005.
  30. W. Härdle and L. Simar, Applied Multivariate Statistical Analysis, vol. 22007, Springer, Berlin, Germany, 2007.
  31. D. Eppstein, “Arboricity and bipartite subgraph listing algorithms,” Information Processing Letters, vol. 51, no. 4, pp. 207–211, 1994. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. Y. Zhang, C. A. Phillips, G. L. Rogers, E. J. Baker, E. J. Chesler, and M. A. Langston, “On finding bicliques in bipartite graphs: a novel algorithm and its application to the integration of diverse biological data types,” BMC Bioinformatics, vol. 15, no. 1, article 110, 2014. View at Publisher · View at Google Scholar · View at Scopus