You are on page 1of 4

Detection of Wormhole Attack in Wireless Sensor Networks

Kuldeep Kaur, Vinod Kumar & Upinderpal Singh


Department of Computer Science & Engineering, Lovely Professional University Punjab, India E-mail : deepu_judge14@yahoo.co.in, vinod.15779@lpu.co.in & upinder.singh418 @gmail.com

Abstract - The wireless sensor network is the collection of sensor nodes which collect information from the environment, the environment may be the building, industrial, battle field or elsewhere. Due to the wireless nature of the sensor nodes they are prone to various attacks like wormhole attack, grayhole, packet flooding, sinkhole attack, blackhole attack, sync attack, Sybil attack. In this paper I proposed the solution to detect the wormhole attack. In this solution I use the concept of digital signature in the packet header information .Using this solution the sensor nodes can be authenticate and can avoid the wormhole attack as possible in wireless sensor networks. Keywords - Hello, Sensor.

I.

INTRODUCTION

2) 3)

A Wireless Sensor Network [1] is a self-configuring network of small sensor nodes communicating among themselves using radio signals, and deployed in quantity to sense, monitor and understand the physical world. The wireless sensor nodes are called motes. A huge number of these devices configure the network and these motes have following capabilities: 1) Computational capabilities. 2) Sensing capabilities. 3) Communication capabilities. As we know that wireless sensor network technology is a technology in which sensor works under the rigorous conditions where human cannot survive for long. The major challenge in the field of wireless sensor technology is the energy consumption along with good bandwidth. This issue requires innovative design techniques to use the available bandwidth and energy efficiency. II. ARCHITECTURE FOR NODES WIRELESS SENSOR NETWORKS IN

Controller It is used to control different modes of operation for processing of data. Memory - Storage for programming data.

4) Communication - A device like antenna for sending and receiving data over a wireless channel. 5) Power Supply- Supply of energy for smooth operation of a node like battery[2].

The nodes have to meet the requirement of a specific application. They should be small cheap, portable and energy efficient. The basic components of a node are: 1) Sensor and actuator - An interface to the physical world designed to sense the environmental parameters like pressure and temperature.

Fig. 1: Architecture of sensor node III. ATTACKS IN NETWORKS WIRELESS SENSOR

The open nature of the wireless communication channels, the lack of infrastructure, the fast deployment practices, and the hostile environments where they may

IRNet Transactions on Computer Science and Engineering

21

Detection of Wormhole Attack in Wireless Sensor Networks

be deployed, make them vulnerable to a wide range of security attacks. The attacks such as[1] 1) Spoofed, altered, information 2) Selective forwarding 3) Sinkhole attacks 4) Sybil attacks 5) Wormholes 6) HELLO flood attacks Spoofed, altered, or replayed routing information The most direct attack against a routing protocol is to target the routing information exchanged between nodes. By spoofing, altering, or replaying routing information, adversaries may be able to create routing loops, attract or repel network traffic, extend or shorten source routes, generate false error messages, partition the network, increase end-to-end latency, etc.[1] Selective forwarding Multi-hop networks are often based on the assumption that participating nodes will faithfully forward received messages. In a selective forwarding attack, malicious nodes may refuse to forward certain messages and simply drop them, ensuring that they are not propagated any further. A simple form of this attack is when a malicious node behaves like a black hole and refuses to forward every packet .[3] Sinkhole attacks In a sinkhole attack, the adversarys goal is to lure nearly all the traffic from a particular area through a compromised node, creating a metaphorical sinkhole with the adversary at the centre. Because nodes on, or near, the path that packets follow have many opportunities to tamper with application data, sinkhole attacks can enable many other attacks . Sinkhole attacks typically work by making a compromised node look especially attractive to surrounding nodes with respect to the routing algorithm. [2][3]. Sybil attack In a Sybil attack a single node presents multiple identities to other nodes in the network. The Sybil attack can significantly reduce the effectiveness of faulttolerant schemes such as distributed storage and multipath. Replicas, storage partitions, or routes believed to be using disjoint nodes could in actuality be using a single adversary presenting multiple identities.[2] or replayed routing

HELLO flood attack Many protocols require nodes to broadcast HELLO packets to announce themselves to their neighbors, and a node receiving such a packet may assume that it is within radio range of the sender. This assumption may be false: a laptop-class attacker broadcasting routing or other information with large enough transmission power could convince every node in the network that the adversary is its neighbor.[3] Wormhole Attack In the wormhole attack, an attacker tunnels messages received in one part of the network over a low latency link and replays them in a different part. The simplest instance of this attack is a single node situated between two other nodes forwarding messages between the two of them. However, wormhole attacks more commonly involve two distant malicious nodes colluding to understate their distance from each other by relaying packets along an out-of-bound channel available only to the attacker. An attacker situated close to a base station may be able to completely disrupt routing by creating a well-placed wormhole. An attacker could convince nodes who would normally be multiple hops from a base station that they are only one or two hops away via the wormhole. This can create a sinkhole: since the attacker on the other side of the wormhole can artificially provide a high-quality route to the base station, potentially all traffic in the surrounding area will be drawn through if alternate routes are significantly less attractive. This will most likely always be the case when the endpoint of the wormhole is relatively far from a base station[4].

Fig. 2 : Illustration of wormhole attack in wireless network.

IRNet Transactions on Computer Science and Engineering

22

Detection of Wormhole Attack in Wireless Sensor Networks

IV. PROPOSED SOLUTION In this section I will explain in detail the proposed solution node authentication using the digital signature. In this algorithm the authentication is provided at each sensor node in the packet header which is forward from source to destination. Only the authenticate nodes can communicate in wireless sensor network. Using this authentication procedure we can detect the malicious nodes which causes the wormhole attack. ALGORITHM Source Node If (Any Packet sent P) { Alter Header add columns =Route and =Signatures Insert id into Route Column Insert Digital Signature into Signature Column Forward Packet P } If (received A Packet) { If (Received Packet==Data_Ack) { Note the =Signature in the header Note Route Noted In header Verify the Digital Signature If(Verification Successful) { Discard the route noted Else { Drop the packet } Repeat the procedure for next packet } } Intermediate Node If (Received a packet P) {

Insert id into Route Column Insert Digital Signature into Signature Column Forward Packet P } Destination Node If (Received a packet P) { Note the =Signature in the header Note Route Noted In header Verify the Digital Signature If(Verification Successful) Note the =Signature in the header Note Route Noted In header Verify the Digital Signature If(Verification Successful) { Noted route=Null; } Else { Noted Route unchanged } Create Data_Ack Packet Insert columns Data_Ack } Insert id into Route Column Insert Digital Signature into Signature Column } V. CONCLUSION Security related issues in wireless sensor networks have become an important part of research in present scenario. To detecting malicious functions of node and offering efficient counter measure is the difficult task. In the proposed method there is no need for specific hardware and neither is the need for clock synchronization due to use of cryptographic concept digital signature. In that each node authenticate using digital signature. The received node at the destination =Route and =Signatures in

IRNet Transactions on Computer Science and Engineering

23

Detection of Wormhole Attack in Wireless Sensor Networks

node is verified and if the digital signature is false the information about that is sent to the sender node using DATA_ACK. REFERENCES [1] Guiyi Wei Xueli Wang Detecting Wormhole Attacks Using Probabilistic Routing and Redundancy Transmission. WASE International Conference on Information Engineering 2010.PP251-254. Junfeng Wu, HonglongChe, Label-Based DVHop Localization AgainstWormhole Attacksin Wireless Sensor Networks.Fifth IEEE International Conference on Networking, Architecture, and Storage 2010. Pp-79-88. Zhibin Zhao, Bo Wei, Xiaomei Dong, Lan Yao, FuxiangGaoDetecting Wormhole Attacks in Wireless Sensor Networks with Statistical AnalysisFirst International Conference on Integrated Intelligent Computing.pp-283-289. Prasannajit B1, Venkatesh, Anupama S An Approach towards Detection of Wormhole Attack in Sensor Networks 2010 First International Conference on Integrated Intelligent Computing. Thorne, Kip S. (1994). Black Holes and Time Warps. W. W. Norton. p. 504.ISBN 03-23763.

[6]

DeBenedictis, Andrew and Das, A. (2001). "On a General Class of Wormhole Geometries". Classical and Quantum Gravity 18 (7): 11871204. Forman G., Zahorjan J,The challenges of mobile computing,IEEE Computer ; 27(4):38-47. Bayrem Triki, Slim Rekhis, Noureddine Boudriga , Digital Investigation of Wormhole Attacks in Wireless Sensor Networks, Network Computing and Applications, IEEE International Symposium, July 2009, pp. 179-186 . Dezun Dong, Mo Li, Yunhao Liu, Xiangke Liao , Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks, Parallel and Distributed Systems, International Conference on , December 2009, pp. 72-79 . B. Prasannajit, Anupama S. Venkatesh, K. Vindhykumari, S.R. Subhashini, G. Vinitha , An Approach Towards Detection of Wormhole Attack in Sensor Networks, Integrated Intelligent Computing , August 2010, pp. 283289.

[7] [8]

[2]

[9]

[3]

[10]

[4]

[5]

IRNet Transactions on Computer Science and Engineering

24

You might also like