Wormhole Attack Detection in Wireless Sensor Networks: 1 Given Name Surname 2 Given Name Surname
Wormhole Attack Detection in Wireless Sensor Networks: 1 Given Name Surname 2 Given Name Surname
Networks
1st Given Name Surname 2nd Given Name Surname
dept. name of organization (of Aff.) dept. name of organization (of Aff.)
name of organization (of Aff.) name of organization (of Aff.)
City, Country City, Country
email address email address
Abstract—Security is one of the most important issue in There are many types of attack in network layer described in
ad-hoc networks like wireless sensor networks because of its [2] are : Sybil attack, Wormhole attack, Sinkhole attack and
unique characteristics like limited bandwidth, limited battery, Flooding.
power and dynamic topology which makes it vulnerable to many
kinds of attacks. Besides ad-hoc networks share a common
wireless medium and lack central co-ordination which makes it In section II description about wormhole attack is given
prone to attacks compared to wired network. Wormhole attack in details. In section III related work proposed by various
is one of the most serious attack in wireless sensor network authors is described. In section IV our proposed work for
and most proposed protocol to defend against this attack used detection of wormhole attack is described. In section V we
positioning devices, directional anteena or synchronized clock.
Most of them requires additional hardwares. In this paper,the present our results. In section VI we conclude.
methods dealing with wormhole attack in wsn are surveyed and
a method is proposed to detect wormhole attack. A modified II. W ORMHOLE ATTACK
AODV(Ad-hoc on demand distance vector) routing protocol is
used which is based on the RTT(Round Trip Time) mechanism
and other characteristics of wormhole attack. As compared to
Wormhole attack consists of two nodes. In wormhole
other solutions shown in literature, proposed approach looks very attack[7], a malicious node tunnels messages received in one
promising. NS-3 simulator is used to perform all simulation. part of the network over a low latency link and replays them
Index Terms—wireless sensor network, security, AODV routing in a different part. Due to the nature of wireless transmission,
protocol, NS-3 the attacker can create a wormhole even for packets not
addressed to iteslf, since it can overhead them in wireless
I. I NTRODUCTION transmission and tunnel them to the attacker at the opposite
Wireless sensor network comprise many interconnected end of the wormhole. The tunnel can be established in many
self-controlled devices(i.e sensor nodes) that are used in a ways e.g in-band and out-of-band channel. For this, the tunnel
collective manner to monitor and/or control environmental packet arrive either sooner or with a less number of hops
phenomena in local or remote environments[8]. Nodes in compared to the packet transmitted over a multi hop routes.
the network communicate with each other using wireless Routing mechanism can get confuse because wormhole node
transcivers and it has no fixed infrastructure. Sensor nodes take a route which may shorter than the original one in the
are deployed in large number to monitor the environment network as it rely on the knowledge about distance between
or system by measurement of physical parameters such nodes. It can occur a variety of attacks against the data traffic
as pressure characteristics of object temparature and their flow. Some of them are selective dropping , eavesdropping
relative humidity or motion[1].WSN has gained popularity replay attack etc.
for its versatile application in civil and military domains, such
as home automation, healthcare, battlefield monitoring and Wormhole attack is classified into four attack models[3].
tracking objects. Each node of the sensor network consists
of the three subsystem: the processing which performs local
A. Encapsulation
computations on the sensed data, the sensor subsystem
which senses the environment and the communicatioin In this attack data packets are encapsulated between the
subsystem which is responsible for message interchange with malicious nodes where several nodes exist between two
neighbouring sensor nodes[1]. malicious nodes.It prevents nodes from incrementing hop
counts on way.The packet is converted into original form by
According to the layer of the OSI model classification the second end point. Since the two ends of wormhole do
of security attacks in WSN is done. Wormhole attack operates not need to have any cryptographic information, or special
at the network layer of the OSI model. requirement such as high-power source or high bandwidth
channel this mode of attack is not difficult to launch.
using a radio interferometry generating ultrasonic waves.
Then each node exchanges the information of these values
of calculated distances. Once these data are exchanged, each
node runs a set of geometric tests on the local data thus
obtained, in order to detect false links present due to the
Wormhole attack. The disadvantage of this approach is that
each node must be equipped with a second ultrasound radio,
allowing the estimation of distances between neighboring
nodes.
Fig. 1. Encapsulation Wormhole
In [12], a statistical approach is proposed, known as SWAN,
in which each sensor collects a recent number of neighbors.
B. Out-of-band Channel A wormhole attack is identified if the current number of
In this wormhole approach, it has only one malicious node neighbors exhibits an unusual increase, compared to the
with much high transmission capability in the network which previous neighborhood counts taken outside of the wormhole
attracts the packets to follow path passing from it. The chances zones. This is a distributed approach so that it doesn’t
of malicious nodes present in the routes established between cause any overhead, unlike a centralized approach. However,
sender and receiver increases on this case. this schemes has been designed for and perform better in
a uniformly distributed network, but their performance is
in question for networks in which sensors are distributed
non-uniformly.
Algorithm:
1) Source node broadcast spoofed RREQ packet
2) Calculate Round Trip Time for each route(Xs )
Xi = X2i - X1
Xsi = Xi / hopcounti
Fig. 3. The flowchart of proposed algorithm
Xh = Average of Xsi
3) Find the path and collect data and count the packet lossl
l = F P - RP
4) If(l is equal to zero) go to 10
5) If(l is smaller than lh ) go to 10
6) Save the node id and attacker id from routing table and
calculate the probablity of attack p(a) and probability of
wormhole attack p(w) by lh and Xh
p(a) = probabilityof attackby((Xs < Xh )&(l < lh ))
p(w) = probabilityof attackby((Xh )&(lh ))
7) If(p(a) is smaller than p(w)lh ) then go to 10
8) Wormhole attack detected
9) Take prevention procedure
10) Forward next packet
V. S IMULATION E NVIRONMENT AND RESULTS Fig. 5. Packet delivery fraction for 10, 14 & 25 nodes
C ONCLUSION
In this paper we proposed a mechanism to detect wormhole
attacks, which is one of the most dangerous attack and difficult
to detect in WSN, and whose purpose is to create false logical
topologies. This attack also enterrupts the calcualtion process
of routes which establishes corrupt and incorrect routes and
makes a large amount of loss of connectivity. Our proposed
method is based on RTT mechanism. In this technique no
special hardware is required. All we need is to calculate
the round trip time and packet loss of every route and
the threshold value. According to simulation the results of
various parameters like throughput, average ETE delay, packet
Fig. 4. Average throughput for 10, 14 & 25 nodes delivery fraction it is proved that our proposed mechanism
performs better than wormhole affected AODV and this helps
In fig. 5, it shows on the results for packet delivery fraction that to reduce the number of lost packets. This method will also
after implementing our proposed AODV the packet delivery detect malicious nodes by which in routing operations, it can
fraction improves for different network density. prevent their particiaption. In future, This proposed method
can be implemented in mobile ad-hoc network also.
In fig. 6, it shows the result for average end to end delay.
When the wormhole nodes are kept in the network, it increases
R EFERENCES
[1] P. Amish and V. Vaghela, “Detection and prevention of wormhole attack
in wireless sensor network using aomdv protocol,” Procedia computer
science, vol. 79, pp. 700–707, 2016.
[2] P. Maidamwar and N. Chavhan, “A survey on security issues to detect
wormhole attack in wireless sensor network,” International Journal on
AdHoc Networking Systems (IJANS) Vol, vol. 2, pp. 37–50, 2012.
[3] M. O. Johnson, A. Siddiqui, and A. Karami, “A wormhole attack
detection and prevention technique in wireless sensor networks.”
[4] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Packet leashes: a defense
against wormhole attacks in wireless networks,” in INFOCOM 2003.
Twenty-Second Annual Joint Conference of the IEEE Computer and
Communications. IEEE Societies, vol. 3. IEEE, 2003, pp. 1976–1986.
[5] R. A. Prakash, W. Jeyaseelan, and T. Jayasankar, “Detection, prevention
and mitigation of wormhole attack in wireless adhoc network by
coordinator,” Appl. Math, vol. 12, no. 1, pp. 233–237, 2018.
[6] L. Hu and D. Evans, “Using directional antennas to prevent wormhole
attacks.” in NDSS, vol. 4, 2004, pp. 241–245.
[7] Z. Tun and A. H. Maw, “Wormhole attack detection in wireless sensor
networks,” World Academy of Science, Engineering and Technology,
vol. 46, p. 2008, 2008.
[8] M. N. A. Shaon and K. Ferens, “Wormhole attack detection in wireless
sensor network using discrete wavelet transform,” in Proceedings of the
International Conference on Wireless Networks (ICWN). The Steering
Committee of The World Congress in Computer Science, Computer
Engineering and Applied Computing (WorldComp), 2016, p. 29.
[9] M. Bendjima and M. Feham, “Wormhole attack detection in wireless
sensor networks,” in SAI Computing Conference (SAI), 2016. IEEE,
2016, pp. 1319–1326.
[10] M. A. Matin and M. Islam, “Overview of wireless sensor network,” in
Wireless Sensor Networks-Technology and Protocols. InTech, 2012.
[11] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux,
“A low-cost secure neighbor verification protocol for wireless sensor
networks,” Tech. Rep., 2008.
[12] S. Song, H. Wu, and B.-Y. Choi, “Statistical wormhole detection for
mobile sensor networks,” in Ubiquitous and Future Networks (ICUFN),
2012 Fourth International Conference on. IEEE, 2012, pp. 322–327.
[13] V. Bhuse, A. Gupta, and L. Lilien, “Dpdsn: Detection of packet-dropping
attacks for wireless sensor networks,” in Proc. Fourth Trusted Internet
Workshop, vol. 107. Citeseer, 2005.
[14] K. Srinivasan, P. Dutta, A. Tavakoli, and P. Levis, “Understanding
the causes of packet delivery success and failure in dense wireless
sensor networks,” in Proceedings of the 4th international conference
on Embedded networked sensor systems. ACM, 2006, pp. 419–420.
[15] M. Lakde and V. Deshpande, “Packet loss in wireless sensor network:
A survey.”
[16] O. Doxygen, “Version 2.3. x,” 2015.
[17] L. Li, X. Hu, and B. Zhang, “A routing algorithm for wifi-based
wireless sensor network and the application in automatic meter reading,”
Mathematical Problems in Engineering, vol. 2013, 2013.
[18] R. Haboub and M. Ouzzif, “Secure routing in wsn,” International
Journal of Distributed and Parallel Systems, vol. 2, no. 6, p. 291, 2011.
[19] J. Govindasamy and S. Punniakodi, “Energy efficient intrusion detection
system for zigbee based wireless sensor networks.”