Open Access   Article Go Back

A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks

Y. SABRI1 , N.E. Kamoun2

Section:Research Paper, Product Type: Journal Paper
Volume-4 , Issue-12 , Page no. 19-26, Dec-2016

Online published on Jan 02, 2016

Copyright © Y. SABRI, N.E. Kamoun . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Y. SABRI, N.E. Kamoun, “A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.12, pp.19-26, 2016.

MLA Style Citation: Y. SABRI, N.E. Kamoun "A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks." International Journal of Computer Sciences and Engineering 4.12 (2016): 19-26.

APA Style Citation: Y. SABRI, N.E. Kamoun, (2016). A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks. International Journal of Computer Sciences and Engineering, 4(12), 19-26.

BibTex Style Citation:
@article{SABRI_2016,
author = {Y. SABRI, N.E. Kamoun},
title = {A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {4},
Issue = {12},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {19-26},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1126},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1126
TI - A Secure Geographic Routing Wormhole Detection for Supporting Mobile Sinks in Wireless Sensor Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Y. SABRI, N.E. Kamoun
PY - 2016
DA - 2017/01/02
PB - IJCSE, Indore, INDIA
SP - 19-26
IS - 12
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
2015 1556 downloads 1450 downloads
  
  
           

Abstract

A wormhole attack is particularly harmful against routing in sensor networks where an attacker receives packets at one location in the network, tunnels and then replays them at another remote location in the network. A wormhole attack can be easily launched by an attacker without compromising any sensor nodes. Since most of the routing protocols do not have mechanisms to defend the network against wormhole attacks, the route request can be tunneled to the target area by the attacker through wormholes. We use one of the basic routing protocols called GRPW-Mus used for Supporting Mobile Sinks in Wireless Sensor Networks . GRPW-MuS, a geographical routing protocol for wireless sensor networks , is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. As introduced in Reference [9, 17], the wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW-MuS is provided called GRPW-MuS-s . Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW-MuS). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.

Key-Words / Index Term

Wireless Sensor Network (WSN), Routing, Security, Wormhole attack

References

[1] Tarik Arici, Toygar Akgun, and Yucel Altunbasak. A prediction error-based hypothesis testing method for sensordata acquisition. ACM Trans. Sen. Netw., 2(4):529�556,November 2006.
[2] Marcello Cinque, Antonio Coronato, Alessandro Testa, andCatello Di Martino. A survey on resiliency assessmenttechniques for wireless sensor networks. In Proceedings ofthe 11th ACM International Symposium on Mobility Management and Wireless Access, MobiWac �13, pages 73�80,New York, NY, USA, 2013. ACM.
[3] Gabriel Martins Dias, Boris Bellalta, and Simon Oechsner.A survey about prediction-based data reduction in wirelesssensor networks. ACM Comput. Surv., 49(3):58:1�58:35,November 2016.
[4] Tassos Dimitriou and Athanassios Giannetsos. Wormholesno more? localized wormhole detection and prevention inwireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in SensorSystems, DCOSS�10, pages 334�347, Berlin, Heidelberg,2010. Springer-Verlag.
[5] Tassos Dimitriou and Athanassios Giannetsos. Wormholesno more? localized wormhole detection and prevention inwireless networks. In Proceedings of the 6th IEEE International Conference on Distributed Computing in SensorSystems, DCOSS�10, pages 334�347, Berlin, Heidelberg,2010. Springer-Verlag.
[6] Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, and Xiangke Liao. Topological detection on wormholes in wireless ad hoc and sensor networks. IEEE/ACM Trans. Netw.,19(6):1787�1796, December 2011.
[7] Mohammad Hammoudeh. Applying wireless sensor networks to solve real-world problems. In Proceedings of theInternational Conference on Intelligent Information Processing, Security and Advanced Communication, IPAC �15,pages 1:1�1:1, New York, NY, USA, 2015. ACM.
[8] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014
[9] Sunil Kumar Jangir and Naveen Hemrajani. Evaluation ofblack hole, wormhole and sybil attacks in mobile ad-hocnetworks. In Proceedings of the Second International Conference on Information and Communication Technology forCompetitive Strategies, ICTCS �16, pages 74:1�74:6, NewYork, NY, USA, 2016. ACM.
[10] Shamneesh Sharma, Dinesh Kumar and Keshav Kishore, "Wireless Sensor Networks- A Review on Topologies and Node Architecture", International Journal of Computer Sciences and Engineering, Volume-01, Issue-02, Page No (19-25), Oct -2013
[11] A. Kopke, M. Swigulski, K. Wessel, D. Willkomm,�P. T. Klein Haneveld, T. E. V. Parker, O. W. Visser, H. S.Lichte, and S. Valentin. Simulating wireless and mobilenetworks in omnet++ the mixim vision. In Proceedings ofthe 1st International Conference on Simulation Tools andTechniques for Communications, Networks and Systems &Workshops, Simutools �08, pages 71:1�71:8, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[12] Konrad-Felix Krentz and Gerhard Wunder. 6lowpan security: Avoiding hidden wormholes using channel reciprocity.In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED �14, pages 13�22,New York, NY, USA, 2014. ACM.
[13] Abdelkader Laouid, Mohamed-Lamine Messai, Ahcene`Bounceur, Reinhardt Euler, Abdelnasser Dahmani, and Abdelkamel Tari. A dynamic and distributed key management scheme for wireless sensor networks. In Proceedingsof the International Conference on Internet of Things andCloud Computing, ICC �16, pages 70:1�70:6, New York,NY, USA, 2016. ACM.
[14] Stephen Paul Marsh. Formalising trust as a computationalconcept. Technical report, 1994.
[15] Takashi Minohara and Kyosuke Nishiyama. Poster: Detection of wormhole attack on wireless sensor networks induty-cycling operation. In Proceedings of the 2016 International Conference on Embedded Wireless Systems andNetworks, EWSN �16, pages 281�282, USA, 2016. Junction Publishing.
[16] Fihri Mohammed, El Fatimi Youssef, Hnini Abedehalim,and Ezzati Abdellah. Investigating the impact of black-holeattack on hierarchical protocols and direct transmission inwsn. In Proceedings of the International Conference onInternet of Things and Cloud Computing, ICC �16, pages78:1�78:4, New York, NY, USA, 2016. ACM
.[17] Richa Mudgal and Rohit Gupta. An efficient approach forwormhole detection in manet. In Proceedings of the SecondInternational Conference on Information and Communication Technology for Competitive Strategies, ICTCS �16,pages 29:1�29:6, New York, NY, USA, 2016. ACM
[18] Ibrihich Ouafaa, Laassiri Jalal, Krit Salah-ddine, andEl Hajji Said. The comparison study of hierarchical routingprotocols for ad-hoc and wireless sensor networks: A literature survey. In Proceedings of the The International Conference on Engineering & MIS 2015, ICEMIS �15, pages32:1�32:8, New York, NY, USA, 2015. ACM.
[19] Yassine Sabri and Najib El Kamoun. Geographic routingin wireless sensor networks based on a partitioned architecture. International Journal of Computer Applications,153(5):1�8, Nov 2016.
[20] H. Sarbazi-Azad and M. Ould-Khaoua. A simple mathematical model of adaptive routing in wormhole k-ary ncubes. In Proceedings of the 2002 ACM Symposium on Applied Computing, SAC �02, pages 835�839, New York, NY,USA, 2002. ACM.
[21] Marcelo P. Sousa, Ajey Kumar, Marcelo S. Alencar, andWaslon T.A. Lopes. Performance evaluation of a selective cooperative scheme for wireless sensor networks. InProceedings of the 6th ACM Symposium on PerformanceEvaluation of Wireless Ad Hoc, Sensor, and UbiquitousNetworks, PE-WASUN �09, pages 85�92, New York, NY,USA, 2009. ACM.
[22] Yanqiang Sun, Xiaodong Wang, and Xingming Zhou. Jamming attack in wsn: A spatial perspective. In Proceedings ofthe 13th International Conference on Ubiquitous Computing, UbiComp �11, pages 563�564, New York, NY, USA,2011. ACM.
[23] Kun-Lin Tsai, MengYuan Ye, and Fang-Yie Leu. Securepower management scheme for wsn. In Proceedings of the7th ACM CCS International Workshop on Managing Insider Security Threats, MIST �15, pages 63�66, New York,NY, USA, 2015. ACM.
[24] R. Annie Uthra and S. V. Kasmir Raja. Qos routing inwireless sensor networks�a survey. ACM Comput.Surv., 45(1):9:1�9:12, December 2012.
[25] Andras Varga and Rudolf Hornig. An overview of the om-�net++ simulation environment. In Proceedings of the 1stInternational Conference on Simulation Tools and Techniques for Communications, Networks and Systems &Workshops, Simutools �08, pages 60:1�60:10, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
[26] Weichao Wang and Bharat Bhargava. Visualization ofwormholes in sensor networks. In Proceedings of the 3rdACM Workshop on Wireless Security, WiSe �04, pages 51�60, New York, NY, USA, 2004. ACM.
[27] Yurong Xu, Yi Ouyang, Zhengyi Le, James Ford, and FilliaMakedon. Analysis of range-free anchor-free localizationin a wsn under wormhole attack. In Proceedings of the 10thACM Symposium on Modeling, Analysis, and Simulationof Wireless and Mobile Systems, MSWiM �07, pages 344�351, New York, NY, USA, 2007. ACM.
[28] Lin Yao, Lin Kang, Pengfei Shang, and Guowei Wu. Protecting the sink location privacy in wireless sensor networks. Personal Ubiquitous Comput., 17(5):883�893, June2013.