Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 8354930, 13 pages
http://dx.doi.org/10.1155/2016/8354930
Research Article

WRHT: A Hybrid Technique for Detection of Wormhole Attack in Wireless Sensor Networks

I.K.G. Punjab Technical University, Kapurthala, Punjab, India

Received 30 August 2016; Revised 23 October 2016; Accepted 2 November 2016

Academic Editor: Abdallah Makhoul

Copyright © 2016 Rupinder Singh et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Marti, T. J. Giul, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom '00), pp. 255–265, ACM, Boston, Mass, USA, August 2000. View at Publisher · View at Google Scholar
  2. H. S. Chiu and K. S. Lui, “DePHI: wormhole detection mechanism for ad hoc wireless networks,” in Proceedings of the IEEE 1st International Symposium on Wireless Pervasive Computing, pp. 1–6, Phuket, Thailand, January 2006. View at Scopus
  3. Y. Cho, G. Qu, and Y. Wu, “Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks,” in Proceedings of the 1st IEEE Security and Privacy Workshops (SPW '12), pp. 134–141, May 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. J. A. F. F. Dias, J. J. P. C. Rodrigues, F. Xia, and C. X. Mavromoustakis, “A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks,” IEEE Transactions on Industrial Electronics, vol. 62, no. 12, pp. 7929–7937, 2015. View at Publisher · View at Google Scholar
  5. J. Dromard, R. Khatoun, and L. Khoukhi, “A Watchdog extension scheme considering packet loss for a reputation system in wireless mesh network,” in Proceedings of the 20th International Conference on Telecommunications (ICT '13), pp. 1–5, Casablanca, Morocco, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Hernández-Orallo, M. D. S. Olmos, J.-C. Cano, C. T. Calafate, and P. Manzoni, “CoCoWa: a collaborative contact-based watchdog for detecting selfish nodes,” IEEE Transactions on Mobile Computing, vol. 14, no. 6, pp. 1162–1175, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. E. Hernández-Orallo, M. D. Serrat, J.-C. Cano, C. T. Calafate, and P. Manzoni, “Improving selfish node detection in MANETs using a collaborative watchdog,” IEEE Communications Letters, vol. 16, no. 5, pp. 642–645, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense against wormhole attacks in wireless networks,” in Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies, vol. 3, pp. 1976–1986, April 2003. View at Scopus
  9. W. Wang, B. Bhargava, Y. Lu, and X. Wu, “Defending against wormhole attacks in mobile ad hoc networks,” Wireless Communications and Mobile Computing, vol. 6, no. 4, pp. 483–503, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-based compromise-tolerant security mechanisms for wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 247–260, 2006. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Čapkun, L. Buttyán, and J.-P. Hubaux, “SECTOR: secure tracking of node encounters in multi-hop wireless networks,” in Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pp. 21–32, Fairfax, Va, USA, 2003. View at Publisher · View at Google Scholar
  12. J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, “TrueLink: a practical countermeasure to the wormhole attack in wireless networks,” in Proceedings of the 14th IEEE International Conference on Network Protocols (ICNP '06), pp. 75–84, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  13. L. Hu and D. Evans, “Using directional antennas to prevent wormhole attacks,” in Proceedings of the Network and Distributed System Security Symposium, San Diego, Calif, USA, February 2004.
  14. I. Khalil, S. Bagchi, and N. B. Shroff, “LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks,” in Proceedings of the International Conference on Dependable Systems and Networks (DSN '05), pp. 612–621, Yokohama, Japan, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. I. Khalil, S. Bagchi, and N. B. Shroff, “Mobiworp: mitigation of the wormhole attack in mobile multihop wireless networks,” in Proceedings of the IEEE Secure Communication, pp. 1–12, September 2006. View at Publisher · View at Google Scholar · View at Scopus
  16. R. Poovendran and L. Lazos, “A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks,” Wireless Networks, vol. 13, no. 1, pp. 27–59, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. W. Wang and B. Bhargava, “Visualization of wormholes in sensor networks,” in Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe '04), pp. 51–60, Philadelphia, Pa, USA, October 2004. View at Publisher · View at Google Scholar
  18. R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information,” in Proceedings of the IEEE 26th IEEE International Conference on Computer Communications (INFOCOM '07), pp. 107–115, Anchorage, Alaska, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. N. Song, L. Qian, and X. Li, “Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach,” in Proceedings of 19th IEEE International Parallel and Distributed Processing Symposium (IEEE IPDPS '05), p. 289, Denver, Colo, USA, April 2005. View at Publisher · View at Google Scholar
  20. L. Buttyán, L. Dóra, and I. Vajda, “Statistical wormhole detection in sensor networks,” in Security and Privacy in Ad-Hoc and Sensor Networks, R. Molva, G. Tsudik, and D. Westhoff, Eds., vol. 3813 of Lecture Notes in Computer Science, pp. 128–141, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  21. S. A. Borbash, A. Ephremides, and M. J. McGlynn, “An asynchronous neighbor discovery algorithm for wireless sensor networks,” Ad Hoc Networks, vol. 5, no. 7, pp. 998–1016, 2007. View at Publisher · View at Google Scholar · View at Scopus
  22. D. Angelosante, E. Biglieri, and M. Lops, “Neighbor discovery wireless networks: a multiuser-detection approach,” in Proceedings of the Information Theory and Applications Workshop (ITA '07), pp. 46–53, 2007.
  23. M. Keally, G. Zhou, and G. Xing, “Watchdog: Confident event detection in heterogeneous sensor networks,” in Proceedings of the 16th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS '10), pp. 279–288, April 2010. View at Publisher · View at Google Scholar · View at Scopus
  24. M. J. Kim, M. Medard, and J. Barros, “Algebraic watchdog: mitigating misbehavior in wireless network coding,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 10, pp. 1916–1925, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. X. Liu, S. Chen, and W. Song, “A design and implementation of watchdog based on observer pattern and finite state machine,” in Proceedings of the 10th IEEE International Conference on Reliability, Maintainability and Safety (ICRMS '14), pp. 407–411, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  26. R. Maheshwari, J. Gao, and S. R. Das, “Detecting wormhole attacks in wireless networks using connectivity information,” in Proceedings of the 26th IEEE International Conference on Computer Communications (IEEE INFOCOM '07), pp. 107–115, Barcelona, Spain, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  27. T. Zhang, J. He, Y. Zhang, Y. Zhang, and X. Song, “DV-based robust localization against wormhole attacks in wireless sensor networks,” Journal of Computational Information Systems, vol. 7, no. 13, pp. 4732–4739, 2011. View at Google Scholar · View at Scopus
  28. M. Khabbazian, H. Mercier, and V. K. Bhargava, “Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 8, no. 2, pp. 736–745, 2009. View at Publisher · View at Google Scholar · View at Scopus
  29. J. Singh, S. Gupta, and L. Kaur, “A cross-layer based intrusion detection technique for wireless networks,” The International Arab Journal of Information Technology, vol. 9, no. 3, pp. 201–207, 2012. View at Google Scholar · View at Scopus
  30. S. Ji, T. Chen, and S. Zhong, “Wormhole attack detection algorithms in wireless network coding systems,” IEEE Transactions on Mobile Computing, vol. 14, no. 3, pp. 660–674, 2015. View at Publisher · View at Google Scholar · View at Scopus
  31. N. Tsitsiroudi, P. Sarigiannidis, E. Karapistoli, and A. A. Economides, “A mobile application for visual-assisted wormhole attack detection in IoT-enabled WSNs,” in Proceedings of the 9th IFIP Wireless and Mobile Networking Conference (WMNC '16), pp. 103–109, Colmar, France, July 2016. View at Publisher · View at Google Scholar
  32. J. Biswas, A. Gupta, and D. Singh, “WADP: a wormhole attack detection and prevention technique in MANET using modified AODV routing protocol,” in Proceedings of the 9th IEEE International Conference on Industrial and Information Systems (ICIIS '14), pp. 1–6, December 2014. View at Publisher · View at Google Scholar · View at Scopus
  33. M. M. Patel and A. Aggarwal, “Two phase wormhole detection approach for dynamic wireless sensor networks,” in Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET '16), pp. 2109–2112, Chennai, India, March 2016. View at Publisher · View at Google Scholar
  34. T. Hayajneh, P. Krishnamurthy, and D. Tipper, “DeWorm: a simple protocol to detect wormhole attacks in wireless ad hoc networks,” in Proceedings of the 3rd IEEE International Conference on Network and System Security (NSS '09), pp. 73–80, Gold Coast, Australia, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. Y. Wang, Z. Zhang, and J. Wu, “A distributed approach for hidden wormhole detection with neighborhood information,” in Proceedings of the IEEE 5th International Conference on Networking, Architecture and Storage, pp. 63–72, Macau, China, July 2010.
  36. S. Choi, D.-Y. Kim, D.-H. Lee, and J.-I. Jung, “WAP: wormhole attack prevention algorithm in mobile ad hoc networks,” in Proceedings of the IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing( SUTC '08), pp. 343–348, Taichung, Taiwan, June 2008. View at Publisher · View at Google Scholar · View at Scopus
  37. J. Eriksson, M. Faloutsos, and S. V. Krishnamurthy, “Routing amid colluding attackers,” in Proceedings of the 15th IEEE International Conference on Network Protocols (ICNP '07), pp. 184–193, IEEE, Beijing, China, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  38. R. Matam and S. Tripathy, “WRSR: wormhole-resistant secure routing for wireless mesh networks,” EURASIP Journal on Wireless Communications and Networking, vol. 2013, article 180, 2013. View at Publisher · View at Google Scholar
  39. M.-Y. Su, “WARP: a wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks,” Computers & Security, vol. 29, no. 2, pp. 208–224, 2010. View at Publisher · View at Google Scholar · View at Scopus
  40. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks,” ACM Transactions on Information and System Security, vol. 10, no. 4, article 18, 2008. View at Publisher · View at Google Scholar · View at Scopus
  41. Beecrypt, http://sourceforge.net/projects/beecrypt/.
  42. R. L. Rivest, A. Shamir, and L. Adleman, “Method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Scopus
  43. R. Rivest, “The md5 message-digest algorithm,” RFC 1321, 1992. View at Google Scholar